Showing posts with label internet. Show all posts
Showing posts with label internet. Show all posts

Monday, March 18, 2013

Goodbye Google?

I opted for a Gmail account back in the day when you still needed an invite to get it. It still said "Beta" on the logo. My gmail account has been my primary email address for pretty much EVER. I had an over abundance of blog subscriptions in my Google Reader.  I've got stuff in Google Drive. I use Google Calendar to share data with my hubby who's an Apple fan-boy.  This blog is on Blogger.

And now I'm falling out of love. I'm worried about the compatibility with Microsoft and Windows 8, on my computer and on my phone. The end of support (and extension of support) for Exchange Active Sync is worrisome. And now they've told everyone to use CalDAV, but that's going away too.  And Reader, well, everyone knows about what's going on with Reader.

But my gmail address is so ingrained in stuff, I'm just not sure I'll ever be able to cut the ties. But maybe a partial migration - I'm not sure. I'm really liking the two-factor authentication features. So instead of rushing and making any rash decisions, I'm taking it slow.

When it comes up, I change an email address registered with something away from my Gmail address. Starting to spread my eggs around in some other baskets, so to speak.

I took this opportunity to start fresh with my RSS feeds.  Today, instead of hunting for a place to move my subscriptions to, I culled them down to about a dozen feeds that I gravitate toward on a daily basis. New feeds will have to earn their place on my reading list and I'm hoping by July 1st, I'll have found a new home for them.

What are you plans for your use of Google services?  Have they finally jumped the shark?

Friday, August 17, 2012

So what's been fun on the Internet lately?


First up, in case you missed out on some of the new things from Microsoft, Windows 8 and Server 2012 are coming soon!  When you have some free time, start learning more about Server 2012 or take a close up look at Windows 8. You can even download a 90-day trial of the new desktop client.

And here are some other links to some fun things I've seen online, mostly via Twitter:
For those of you who work on Exchange, don't miss out on these:

Friday, July 29, 2011

The Country Code for Nigeria is 234

We all know about the long running Nigerian email scams, the ones where some "Prince" of some "Small Country" has cash he can't access and wants to give you a nice cut if you can front him a couple thousand dollars via Western Union. I guess people have finally caught onto that one, because now the new big Nigerian scam is renting you a place they don't own via Craigslist or some other source for rental listings.

A friend of mine has been looking for a reasonably priced rental in the Bay Area and sent off a few inquires to some nearly "too good to be true" listings. He recieved three practically identical emails in return, from three different "gentlemen", with only the property address, dollar amounts and contact phone numbers differing.

They weren't asking for cash with the first email, but required an odd rental application form to be returned for approval. The emails also had several other characteristics that smell of a farce. See for yourself.

Thanks for the email. My name is Thomas Hough the owner of the 1 Bedroom Apartment you are making inquiry of, I've had so many responses so far,however it is still available but I do have one person who is ahead of you. I'll rent it to whoever puts down the deposit .Rent includes water and garbage. My company sent me overseas and will probably be between Africa, India and the UK for another year or so. The last tenants I had just moved out and my family and friends all live on the east coast so I don't have anyone available to show the place but I can send you pictures of the inside but will have to ship you the keys and papers.

Here is the address:[property address removed]...Ready for immediate move-in!You can drive down there to take a look at it...i will be willing to rent my home out for the maximum of 5 years and below.I personally had wanted to sell the Apartment earlier on.But after long time deliberation between me and my wife Sarah we finally agreed on renting out the Home, because it was initially to be sold. But I really want you to take good care of the Apartment, as if it were your own home.I would want to know how soon you would want to move in, as I will be taking a 1 or 2 month upfront payment which mean the first and last months you will be staying in the Apartment including some utilities (Water, Internet and Garbage). I am asking for $670 1 month upfront payment and if you can pay $1340 for 2months you will be getting a 1 month rent free. I believe we should be able to help ourselves. including utilities because I want you to take a very good care of the Apartment while I am away.

i will like you to go ahead and fill out the rent application form so that will can proceed further and discuss on how to get the the keys and papers sent to you via Dhl or ups e.t.c, also are you ready to rent it now or when?.So here is the Rent Application Form Below..
========= RENT APPLICATION FORM ============

PRIVATE & CONFIDENTIAL

Also,Pls answer these questions below:

1)Your Full Name______________________________________
2)Present Address(where you reside now) & PhoneNumber______________________________
3)How old are you _____________________________
4)Are you married ______________________________ _____
5)How many people will be living in the Home___________________________
6)Do you have a pet _________________________________________
7)Do you have a car __________________________________________
8)Occupation _________________________________________________
9)How long are you willing to stay _________________________________________
10)When do you intend to move in _________________________________________
11)1 month Or 2 month deposit needed______________________________________
12) Pictures of all the Occupant that will stay in my Home______________________________________

P
et allowed.

I will use the information above to prepare the rental agreement , rent receipts and other documents. Make sure the correct information is type.Do reply with your both cell & Apartment number i am going to call you if your application form has been accepted or call me after filling the rental application form. A package containing the housing documents, property address with full description. Including the direction to the place and keys will be ship to you once you both agreed with the term and condition. Call me once you fill out the application form.Here is my contact number: +234-708-289-7758 or 011234-708-289-7758 i will be expecting your call to know how serious you are in renting my Home

Thanks & God Bless

Here are my redflags:

  1. Weird use of capitalization and puctuation, like with "1 Bedroom Apartment" and no spacing after commas, etc.
  2. Claiming to live overseas and having no one to show the place - Really? You've owned a home and don't even know a neighbor? Haven't heard of a property management company?
  3. "I believe we should be able to help ourselves." - Huh? Writing generally has strange phrasing not uncommon to someone who's not great of writing or speaking English.
  4. Weird text-based "rental application" - Most legit landlords will send a PDF version of a standard application, with questions geared so they can run a proper background or credit check. How old are you? Are you married? Do you have a car? How long are you willing to stay? Pictures of all the Occupants? - I don't even know where to begin.
  5. Nigerian contact phone number - Um, yeah. That's a big one.
  6. Property Address (which I removed for this post) - A quick internet search of the property address shows that this place is listed on the MLS for sale. It includes several photographs, including the exterior shot that the scammer sent with this email.
I know the Internet is a big place, filled with lots of opportunity to find what you need and solve problems. But you have to trust your instincts, pay attention and help others who might not be so savvy to look out for stuff like this.

This only happens because it's worth it to scammer. Enough people list out their pet names, attach a family photo and don't give a thought about how odd it is that they are potentially renting a place based on a couple photos and some guy who claims he wants you to "take care of the Apartment like it were your own Home." Clearly, it's lucrative enough to keep doing and that's a real shame.

Stay safe out there and if you come across listings like this be sure to report them to the host of rental listing site so they can be removed.

Thursday, June 9, 2011

Bing and It's Done. For Real.

I've been dreading planning some summer travel. Or more specifically finding reasonable flights for summer travel.  I spent the last several weeks checking some travel websites and have been frustrated with the prices - Would they go down?  Should I just buy them and be done with it?  Will I be kicking myself for not waiting another week or day or be annoyed that I waited to long?

It was suggested that I check out bing.com for travel.  Now I can't say that I use Bing much for my regular Internet searches.  I've used Google since the beginning of time and I'm comfortable with it for what I usually need.  But hey, Bing is the "decision engine" and I wasn't getting anywhere fast with my ticket search otherwise.  It was worth a shot.

And then it was mission accomplished. Bing. Done. Wow.

To be fair, the search results are powered by kayak.com, and I've used Kayak directly in the past but it never struck me as any better than Expedia, which had been my go-to travel site for years.  (Like my use of Google, old habits die hard.)  Though often, I'd find the flight on Expedia and then book it directly from the carrier to elimate the middle man, especially since I don't often need travel packages.

With Bing you have all the features where you can customize your results based on number of stops, the travel times, red-eye or not, etc and you can look for hotels and other deals as well.  Once you select your flight, Bing redirects you to the carrier so you can complete the purchasing process directly.  From the main functionality standpoint, most flight search sites hand you the same base features and Bing doesn't disappoint.

The big selling point was the prominance of the price predictor and the fare history.  This is where the "decision" with booking flights comes into play.  This was the cleanest presentation of the where prices had been and where they might be going - it was the perfect stock ticker for travel. 

Perhaps I just got lucky but according to those tools, I was finally hitting the right time.  Ticket prices were the lowest they'd been in about 4 weeks and would likely go higher - I finally had the information I needed to move forward and put my money on the line.

Now I can check that off my list and you can be sure I'll use Bing for travel again in future. I guess everyone can learn a new trick now and then.

Friday, December 17, 2010

Google Calendar and the “Unsupported” Browser

A couple weeks ago, I started experiencing a curious problem with Google Calendar on my netbook.  I’m running IE 8 (8.0.7601.16562 to be exact) and every time I loaded up my calendar I got a message alerting me about using and unsupported browser.

“Sorry, you are trying to use Google Calendar with a browser that isn’t currently supported…”

Since I’m also using IE8 at work (version 8.0.7600.16385) without any calendar issues, I did what many sysadmins do when stuff doesn’t work on their own computers – I ignored it for a while, hoping it would just resolve itself.

However, today I did a little looking around and found the issue, which ironically is caused by the Google ChromeFrame Add-In.  I turned that off and the calendar now loads without any error messages.  The version of the add-in I had installed was ChromeFrame 8.0.552.224.

Monday, December 6, 2010

Take Aways from the Data Connectors Tech-Security Conference

Last week, I attended a free one-day conference hosted by Data Connectors.  Sometimes free conferences aren't worth the time it takes to get there, but I was really happy with this one.  While all the presentations were vendor sponsored, the majority were product neutral and really shared some decent content.  In addition to the vendor presentations, there was a decent sized expo area with other security vendors to peruse.

Here are some of the stats and tidbits I left with. As some of the themes overlapped throughout the presentations, so I'm not going to attribute each bullet point to a specific presenter.  However the presentations were sponsored by the following companies: WatchGuard, Axway, Sourcefire, Top Layer Security, JCS & Associates, Kaspersky Lab, Cyber-Ark, FaceTime and Arora / McAfee.  You can learn more about the presentations specifics and download some of the slide decks here on the event agenda page.

End Users
  • End users in the workplace expect to have access to the web and popular web applications, however 25% of companies need to update their policies related to web use. Instead of addressing the policy issues, companies simply block access to web applications entirely.
  • End users need more education about threats like email scams, pop-ups offering anti-virus solutions, links sent via social media sites, tiny URLs, etc. End users are your biggest threat - often due to error or accidents.
  • The average employee spends 3 hours a day doing non-work items on their computer.
General Company Security and Policies
  • Consider reviewing and improving on your file transfer management practices. How do people share data within your organization and externally? Is it secure and managed?
  • Most companies feel secure, but aren't really. Check out http://www.idtheftcenter.org/ for a list of companies that have experienced data breaches. Many companies simply rely on their vendors to declare that they are secure and protected.
  • Consider using different vendors to protect your data at different levels. Different vendors use different mechanisms to detect and deter threats.
  • As an administrator, you have to review logs on computers, firewalls, servers, etc. This way you are familiar with what is "normal" and can easily recognize potential breaches.
  • Consider data encryption as means to enable your company to meet regulation compliance. Encryption technology has evolved and it doesn't have to be as painful as it has been in the past.
  • You should patch all your computer regularly - don't forget that your printers, routers and switchers are computers too.
Browsers and the Internet
  • The top Internet search terms that are likely to lead you to site with malware on it are "screensavers" (51.9% chance of an exploit), "lyrics" (26.3%) and "free" (21.3%).
  • In 2009, the Firefox browser had the greatest number of patches and overall, vulnerabilities in applications exceeded operating system vulnerabilities.
  • The web browser is the #1 used application, but the patch cycle for browser add-ins is slower than for other applications and operating systems.
  • Drive-by downloads are still the #1 way to exploit computers.
Sometimes I leave conferences scared by the massive list of items that I feel I need to address, however, I left this conference with not only some tasks in mind, but some great leads on how to go about completing those projects.  Check out the Data Connectors events list to see if there is a similar conference coming up in your area in 2011.  They have well over two dozen other planned dates across the US, including Los Angeles in January and San Jose in February.

Friday, November 5, 2010

Don’t Miss Out on gogoNET Live! Videos

On Wednesday, I had the pleasure of doing the post-presentation interviews for the speakers at the gogoNET Live! IPv6 Conference. These short little chats should be posted at www.gogonetlive.com in the next few days and will give you a taste of what each presentation included and some tips for implementing IPv6.  Hopefully I’ll have some time in the next few weeks to listen to some of the full presentations (soon to be available as well), so here are few that will be on my list.

  • Bob Hiden, Check Point Fellow and Co-inventor of IPv6 - his presentation on why IPv6 was invented will give anyone a good overview of why IPv6 is a necessary move for anyone who uses or supports activities on the Internet.
  • Elise Gerich, Vice President of IANA and John Curran, President and CEO of ARIN – both spoke about the various aspects of the anatomy of IPv4 address depletion.  I’ve always been fascinated by the DNS and IP address infrastructures that make the internet work and you can’t get any closer to the source that with these industry executives.
  • Silvia Hagan, CEO of Sunny Connection – Silvia’s presentation was on how to convince your boss to make the move to IPv6. She’s also the author of the O’Reilly book on IPv6, so trust her ideas are good ones.
  • Jeremy Duncan, the Senior Director of IPv6 Network Services at Command Information – Jeremy focused on how to set up and get the most out of your test/lab network.  We all will have to start somewhere when it comes to learning about IPv6 and some good tips on getting your lab of the ground will go a long way.
  • Joe Klein, the Cyber Security Principal Architect at QinetiQ – IPv6 has many security features built right in.  Be sure to check out what Joe has to say about the features, changes and possibilities once IPv6 is well established. 
Special Note: As of this writing, the videos are not yet posted.  Make a note to check in a www.gogonetlive.com next week to see when they are available.

Friday, October 22, 2010

DNS Transitioning within AT&T

It took several months of emails, phone calls and coordination, but I finally managed to get our office Internet connection switched from the "legacy" (aka "PacBell") frame relay to the newer AT&T fiber optic network.  This also included an upgrade in our connection speed, which is always a win.  Our IP address ranges were ported from the legacy account to the new service, so we had very little downtime during the cut over - it was a fantastic migration experience.

 After letting our new service settle in for a few weeks and since email responses from AT&T reps are often spotty or non-existent, I called up the customer service number to request that the legacy account be cancelled so we are no longer billed.  The representative I spoke to happily emailed me a "Letter of Authorization to Disconnect" that I would need to verify, sign and return.  Seemed pretty easy to me.

 As I reviewed the letter, I noticed a familiar account number referencing the Internet access, different than the billing account number.  It was the same account number that I used to request changes to our external DNS registrations. Bells went off in my head. Certainly those DNS entries would be ported to the new service with the IP address ranges themselves, right?  Right?

 To confirm, I started off with the tech support email for my new service.  They promptly replied, saying I needed to contact the DNS team and provided additional contact information.  I called the DNS team and explained my situation.  The representative confirmed, that no, they don't have any of our DNS records in their systems.  Our DNS records are with the legacy PBI group.  I'd have to submit a request to add the DNS records with the new group so that they had them in their name servers prior to the disconnect of the legacy service.  He was also nice enough to explain their system for requesting changes, which involved knowing a magic "CCI Number" for my account.  This CCI number which was totally new and different than anything else I knew about and which I promptly wrote down as an addition to my runbook.  (I swear, I learn something new about telecommunications every time I get off the phone with AT&T.)

Then I gathered up all the known external DNS records I had documented and sent an email to the legacy DNS group asking for a copy of my zone record so I could be sure I didn't miss anything.  Based on what I have on hand, it'll be a great time to do some housecleaning with our external zone records.   I will also need to update our domain registrars with the new name servers as well.

If all goes well, this will be sorted out in a few days and I'll be free of my old circuits and billing by the end of November.  If not, I'm sure I'll have another story to tell.

Tuesday, October 12, 2010

October is National Cyber Security Month

Personally, I think every month should be a month people pay attention to security online, but regardless, here are some resources and blog posts to help you think about being more secure as you navigate the world online.

First, Microsoft has a whole site dedicated to online safety, don't miss out on some tips for creating more secure passwords and using public computers.  There are even some great brochures and sheets you can print out and share at the office or with clients.

Also, check out this post by Microsoft's Worldwide Chief Security Officer, Robert Halbheer, on "Is the online world more dangerous?" He provides a link to another great handout that addresses some myths regarding online safety.

Finally, one of the most common ways that people are exposed to online security risks is by clicking on spam.  Check out a short post on managing spam by another sysadmin that works in the trenches, The UberGeekGirl.

When it comes down to it, managing your security and safety online is not all that different from managing it everywhere else.  You already keep track of your keys and your wallet, you lock your car and your house when you leave, and you don't leave your credit information around for people to grab.  Just do the same online - keep track of your passwords, don't stay logged onto web services on public computers, don't click on links that look suspicious in emails or on social networking sites and look to do business with online companies that use secure websites for transactions. 

Keep safe everyone, no matter where you are.

Friday, August 20, 2010

The Web is Dead? Maybe We Just Can't Get There.

Wired magazine published an article in this month’s issue that argues that the “Web” is dead.  The "Web" being defined as the “dub dub dub” (www) part of the Internet, which is viewed and interacted with using a web browser. 

The Internet is transport method for a variety of protocols and components that make the system work and help people communicate and share information.  Email and FTP are still alive, even though they may not be the most popular mechanisms for younger users.  Over the years there have been many predictions of things being “dead” that are still very much alive.  Check out this great post - The Tragic Death of Practically Everything, by Harry McCracken, to see what I mean.

Its true that the Internet has evolved in many ways over the last 15 years or so.  It’s used as a transport mechanism for phone calls, music and an endless supply of information that people access using very specific apps – not always using a web browser. But for many, that traditional “web” presence is still very real. Just about anyone with basic access to a computer and the Internet can set up a free website or blog.  Apps might be the current big thing, but the skill set required for setting up a basic website is far less daunting than developing a phone app. 

A bigger issue facing the future of “www” is accessing it in the first place.  Any device that connects to the Internet needs an address and the current IP addressing system (IPv4) is quickly running short of these valuable addresses.  It’s estimated that these addresses will be completely depleted within the next year.  IPv6 is the next generation of addressing for Internet connectivity and it has not yet been widely adopted.  Its important that those involved with managing networks and providing connectivity to the Internet stay up to date and plan for the conversion to this new addressing scheme. 

Cool apps and new tools will always make the Internet a more exciting/useful place to be and there will be a place for the traditional web for a while to come, assuming you can get there.

Friday, July 23, 2010

Google Voice – Never listen to voice messages again.

I’ve been using Google Voice for several months and now that it’s available to everyone in the US (no invitation required) it might be a good time to take a look at it if you haven’t already.

First off, I’ll admit that I use Google Voice for one key feature – the voice message to text conversion. Sure, it’s nice to have an alternate phone number I can give out if necessary, but when it comes down to it I just really dislike listening to voice mail messages. By having Google Voice convert messages to text and send them to my email or via SMS to my phone, I rarely have to call in to listen to a message.

Now, like many speech-to-text tools it has limitations. If there is a lot of background noise behind the caller, they have heavy accent or tend to speak quickly, the conversion might not be as comprehensive as you’d like. However, it does give me a good gist of what the call is about and if it requires my immediate attention. If I really need additional details from the message, I’ll check the audio at a later time.

Google Voice reduces the time I spend checking voice mail messages from a daily occurrence to something that happens less than once a week. What more could I really want for free? Read more about it on the Google Voice Blog.

Thursday, May 20, 2010

Oops.

Did you miss techbunny.com for a bit yesterday? So did I! Turns out time flies when you are blogging and I let the renewal of my domain slip away. Ouch.

Don’t know why I didn’t get an email reminder, but I was renewed pretty quickly and after a few hours everything was back to normal. But while I was logged into my domain registrars website (I use DotEasy) I figured I’d check out some of their domain management features.

First on the list is “Domain Lock”, which is an annual paid service that blocks requests to transfer the domain to another registrar or hosting company will automatically fail. This can be used to help prevent domain theft, hijacking or other fraudulent transfers of domain names. I usually pass on this service, because email confirmation and authcode requirements should make it pretty difficult for someone change domain registrars without notification.

In addition, if you are using a private registration service, transfer requests will likely fail. Private registration masks your personal information from WHOIS searches and the like. Private registration is sometime free depending on your hosting package, so I make sure to keep that on. The ones that allow you to keep official control of your domain name and just mask the information are the best. Seems worth it from an identity protection standpoint too.

Finally, check to see if your registrar offers automatic domain renewal. Obviously, every registrar would love to keep your business and automatic renewal is handy offering to make that happen. I turned it on for my domain after this week’s oversight and remember to mark my calendar so I won’t make this mistake again!

Thursday, March 11, 2010

Put your money where your cloud is.

Cloud. Cloud. Cloud. Everything is about the “cloud” these days. Though for as long as there has been the Internet, there’s always been a cloud – it’s just a matter of how it was being used. And when it comes to the Internet, it’s a lot about what one can get for free and what is worth paying for.

First off, I’m a heavy user of Google services. Gmail is my starting point for email management and I’ve been pretty happy with the feature set and the service. Plus I love not having to rely on a specific client or specific machine to send mail and can access it from any computer and my phone. I’m not a big fan of Google Docs, but Google Voice is pretty cool too – and all of Google’s services are free, assuming you don’t mind targeted advertising. Plus the BlackBerry application works pretty well.

And let’s face it, there would be no WWW with web hosting services. There are several fine companies that offer free hosting for small sites if you use them for domain registration and don’t need any of the more involved features, like PHP or dedicated servers. I've been happy with DotEasy so far. It does what I need for several small sites I have to keep up and running on the cheap.

For file backup and document access, I use SugarSync. This service is free for the first 2 GB of data, but I’m willing to pay for the 30 GB level. Files are accessible via the web portal and there is an option to email documents to yourself that will then be synced to your registered computers automatically. If you want to check it out, use me as a reference and we’ll all get extra space!

Another cool online tool is Remember The Milk, a task management portal. The web service is free, but the tools to sync to mobile devices requires an annual fee. It’s a bit pricey when compared to what I spend on other services, but there is a two week trial period before needing to commit. The “pro” service also gets you priority email support.

Another cloud related application that I use daily is UberTwitter. This BlackBerry application is my connection to my favorite social media portal and is worth every penny of it’s nominal fee. Sure, Facebook has a free application for the Blackberry, but I find I’m happier the less time I spend there.

Finally, I'd miss the ability to download content onto my Kindle wirelessly over the Internet. Amazon’s service allows me to catch up on the newspaper daily and purchase books without the hassle of having to make extra space in my bag.

It’s easy to get lulled into the idea that everything on the Internet should be free, but I’m willing to put my cash behind web services, features and related applications when they meet my needs. What about you?

Thursday, February 18, 2010

RSA Conference 2010 - You gonna be there?

If you are looking for a reason to hang out in San Francisco’s Moscone Center in early March, look no further. It’s time for the annual RSA Conference on security. With meager a beginning in 1991 with 50 attendees at their first event in Redwood City, RSA has grown to attract over 10,000 attendees annually.
This will be the 4th RSA I’ve attended, though I’ve never attended the full conference. It always looks jam-packed and awesome, but security is only a small portion of my job, thus only gets a small portion of the training dollars I can lobby for myself. So I always opt for the Expo Plus Pass.
I think the Expo Plus Pass is a great way to get a taste of the conference, attend all the keynote speeches and even pick one breakout session to attend. For just shy of $300, I think it’s a great value over the regular Expo Only Pass ($100).
RSA is being held March 1-5th and you can register here.

Wednesday, February 10, 2010

Adventures with Gmail

Last week, I had a bit of a Gmail scare. I arrived at the office and did my usual routine of logging onto the computers at my desk, including logging into my Gmail account. I always have it open in the background, because let’s face it, I’m addicted to “the grid.” All was good for most of the morning. Then at about 11am, I turn around to do something on that computer and my browser window has a big warning message:

Account Lockdown: Unusual Activity Detected

The page also listed several possible reasons for this and indicated I’d be in the penalty box for up to 24 hours. (24 hours?!?)

According to Google, unusual activity includes, but is not limited to:

  1. Receiving, deleting, or downloading large amounts of mail via POP or IMAP in a short period of time.
  2. Sending a large number of undeliverable messages (messages that bounce back).
  3. Using file-sharing or file-storage software, browser extensions, or third party software that automatically signs in to Gmail.
  4. Leaving multiple instances of Gmail open.
  5. Browser-related issues.

It’s really hard not to want to panic in this situation, but what can you do? 24 hours seems like a really long time when it comes to email access and I didn’t just want to sit and wait. Ultimately, my access was restored in a few hours, and I learned a few things about the big “G” in the cloud.

My first concern was that my account might have been compromised, so I wanted to change my password. If my account had been compromised changing the password would likely stop any potential abuse (activity #2). I happen to use several Google services, which made it possible to change my password without having access to the email service. Since the “unusual activity” was limited to email, my account itself wasn’t locked, only it’s connection to mail. I could still access Google Reader, etc – any of those services have a portal to the account management. Using that I changed my password, which made me feel a lot better. (I might not have had access to my mail, but I was sure no one else did now either!)

The only devices connecting to my email at the time where the one work computer and my BlackBerry. Perhaps the BlackBerry BIS service was making too many calls to my account? I logged onto the website for that and disconnected that service. I believe BIS uses IMAP to connect (activity #1), so I figured that couldn’t hurt.

I cleared my IE cache, deleted all my cookies and ran a virus scan on my computer (activity #5). I even cleared the cookies and cache on the other machines on my desk even though I don’t usually use them for Gmail access. At this point I was pretty sure I didn’t have any other machines attempting to connect (activity #4). My home computers were off, my office computers were not connected and my BlackBerry service was removed.

I’ve been told the most common cause of this problem is a “cookie gone bad” or the potential false positive on Google’s side, which clear up in a few hours. I would have liked to have access to the Recent Activity page that you can get to from the bottom of your Gmail Inbox. You can use that to close any other sessions (from home computers, for example) and see the IP addresses from your most recent connection points. Turns out that URL doesn’t change, so bookmark it and it will load if you are logged onto any other Google service.

I don’t think I’ll ever know if I was unintentionally abusing the system, but I can’t help but to feel the punishment was punitive, even for a free service. Google is excellent at collecting data - I’m sure they could tell that my account was not newly created, I was a daily user of the service and I had no prior history of excessive usage patterns. Since I do have an alternate email address in the system, a warning notice or a post-lockdown follow-up message giving me some actions to take would have been helpful. I would have happily performed some remediation checks and then clicked a link to have my account rechecked within a hour. The suspension system is automated, so automating a recheck after the user responds to a message shouldn’t be so difficult.

If I was truly a spammer or if I was someone who wasn’t a daily user of Gmail, I may not even care that the service was suspended for 24 hours, but for those of use the service regularly, a little tech support love can go a long way.

Tuesday, February 9, 2010

Today is Safer Internet Day

Organized by Insafe (a European network of Awareness Centres), Safer Internet Day is held annually on February 9th to promote safe and responsible use of the Internet, especially by children and teens. The topic for 2010 is "Think B4 U Post!"

Speaking of online safety for teens, check out this PSA video by CyberTipline. And for more information about staying safe on the 'web, check out Microsoft's safety website or follow them on Twitter @Safer_Online.

Friday, January 29, 2010

She’s Geeky: Day 1

Today I attended my first “She’s Geeky” unConference. I didn’t know what to expect, but after today I highly recommend checking it out if you are a woman who works in technology (or mention it to a woman you know in the math, science or tech fields).
Lots of women were willing to talk about the areas that interested them in technology, so the day was filled with a variety of topics ranging from using social media to “green” technology, programming and development to Internet privacy and identity. (I even managed to make some time to present an overview of Windows 7!)
The privacy and identity talk was lively and full of ideas about one’s online identity(s) and how managing those can be different for women for a variety of reasons. Managing online privacy is only going to get more important as data continues to be collected, stored and mined, regardless of gender.
Notes from all the sessions will be compiled and available online, so I’m looking forward to being able to recap what I’ve learned (or missed) at the end of the weekend. While not everyone does the same type of “tech” it was a great experience to spend the day with other women who were all passionate about whatever thing that made them “geeky”.

Monday, January 4, 2010

UberTwitter - Beta 6 Released

I was happy to discover that 2010 brought an updated release to my favorite Twitter client for the BlackBerry, UberTwitter. This release supports some of the new features of Twitter, including lists and the updated retweet function. In addition to the added functionality, the UI has been updated to make it easier to access your DM and @ replies. The application icon looks a little too close to the Facebook icon on the BlackBerry for my taste, but perhaps that was done on purpose.

I've been using the free version, which has some advertising, but decided to spent the nominal fee to upgrade to the paid version this year. Since I've been using Twitter more and more to communicate with other tech-minded folk and get news, I figure it's the least I can do.

See you in the Twitterverse!

Friday, December 18, 2009

Who's Geeky? She is.

Happened across the She's Geeky conference while surfing around the web. "She's Geeky" is an event specifically for women interested in and/or working in the technology, math and science industries. Actually, it's an "un"conference - 3 days of geek-minded women gathered together with a daily agenda of tracks and sessions generated fresh every morning.

I'm always up for an interesting tech conference, plus it's hard to pass up an event being held at the Computer History Museum in Mountain View, CA. Seems like a great chance to check out the Babbage Engine, too!

Thursday, December 10, 2009

IT Roadmap at Moscone Center

Yesterday was the Network World IT Roadmap in San Francisco. I had the experience of being the user case study presenter for the virtualization session. If you happened to catch it, I apologize for talking too fast. I'm working on that!

Other sessions covered application delivery, green IT, IP communications, data center, cloud, network management, security and compliance and WAN, LAN and mobility. Phew. Network World offered a lot in one day, plus several additional keynotes and the expo hall. My co-worker caught the WAN, LAN and mobility session, so I'm curious to see what trouble he'll be looking to cause in the office next week.

There was some twittering happening related to the conference, but I was disappointed to see that the @itroadmap Twitter handle didn't tweet at all during the event. They had advertised Twitter on the conference site as a way to stay connected during the conference yet didn't reach out to that audience once. Twitter is becoming a popular way to interact as things happen - several attendees were tweeting during sessions - so it seems like Network World missed out on an opportunity there.

MS ITPro Evangelists Blogs

More Great Blogs