Are the posted questions getting worse?

  • Stefan Krzywicki (6/28/2012)


    Brandie Tarvin (6/28/2012)


    Stefan Krzywicki (6/28/2012)


    What I find most annoying about the iPad is how difficult it is to transfer files from a computer to it or vice versa without restoring to iTunes or Dropbox. I tried moving some pdfs to the iPad from my computer just as a file transfer and there was simply no way to do it.

    What do you mean "restoring"? Or did you mean "resorting?"

    Ha! I meant resorting. That's what I get for chatting and working at the same time. 🙂

    Hee. I was just about to respond with "But I helped a friend move PDFs the other day without restoring anything." That's when I realized I might have read that wrong. @=)

    Brandie Tarvin, MCITP Database AdministratorLiveJournal Blog: http://brandietarvin.livejournal.com/[/url]On LinkedIn!, Google+, and Twitter.Freelance Writer: ShadowrunLatchkeys: Nevermore, Latchkeys: The Bootleg War, and Latchkeys: Roscoes in the Night are now available on Nook and Kindle.

  • Brandie Tarvin (6/28/2012)


    Stefan Krzywicki (6/28/2012)


    Brandie Tarvin (6/28/2012)


    Stefan Krzywicki (6/28/2012)


    What I find most annoying about the iPad is how difficult it is to transfer files from a computer to it or vice versa without restoring to iTunes or Dropbox. I tried moving some pdfs to the iPad from my computer just as a file transfer and there was simply no way to do it.

    What do you mean "restoring"? Or did you mean "resorting?"

    Ha! I meant resorting. That's what I get for chatting and working at the same time. 🙂

    Hee. I was just about to respond with "But I helped a friend move PDFs the other day without restoring anything." That's when I realized I might have read that wrong. @=)

    When I was looking up the price for the camera adapter I saw how much they're asking for the wireless keyboards. At $70, that seems expensive. Maybe there are others that are cheaper.

    --------------------------------------
    When you encounter a problem, if the solution isn't readily evident go back to the start and check your assumptions.
    --------------------------------------
    It’s unpleasantly like being drunk.
    What’s so unpleasant about being drunk?
    You ask a glass of water. -- Douglas Adams

  • Brandie Tarvin (6/28/2012)


    Stefan Krzywicki (6/28/2012)


    Brandie Tarvin (6/28/2012)


    Stefan Krzywicki (6/28/2012)


    What I find most annoying about the iPad is how difficult it is to transfer files from a computer to it or vice versa without restoring to iTunes or Dropbox. I tried moving some pdfs to the iPad from my computer just as a file transfer and there was simply no way to do it.

    What do you mean "restoring"? Or did you mean "resorting?"

    Ha! I meant resorting. That's what I get for chatting and working at the same time. 🙂

    Hee. I was just about to respond with "But I helped a friend move PDFs the other day without restoring anything." That's when I realized I might have read that wrong. @=)

    Also, since I've now started wondering about keyboards for the iPad Here are some reviews[/url]

    --------------------------------------
    When you encounter a problem, if the solution isn't readily evident go back to the start and check your assumptions.
    --------------------------------------
    It’s unpleasantly like being drunk.
    What’s so unpleasant about being drunk?
    You ask a glass of water. -- Douglas Adams

  • Lynn Pettis (6/26/2012)


    Mandatory evacuation area has expanded on the North West side of Colorado Springs. The area now includes the area where I currently work.

    Waiting for email updates to know what our next steps are regarding work. I am glad I live on the South East side of town.

    Please keep a close friend and his family in your thoughts or prayers. They have had to evacuate their home due to the Waldo Canyon Fire.

    Has anyone heard from Lynn? That fire is way too close to him, and I've been wondering about him.

    Wayne
    Microsoft Certified Master: SQL Server 2008
    Author - SQL Server T-SQL Recipes


    If you can't explain to another person how the code that you're copying from the internet works, then DON'T USE IT on a production system! After all, you will be the one supporting it!
    Links:
    For better assistance in answering your questions
    Performance Problems
    Common date/time routines
    Understanding and Using APPLY Part 1 & Part 2

  • WayneS (7/1/2012)


    Lynn Pettis (6/26/2012)


    Mandatory evacuation area has expanded on the North West side of Colorado Springs. The area now includes the area where I currently work.

    Waiting for email updates to know what our next steps are regarding work. I am glad I live on the South East side of town.

    Please keep a close friend and his family in your thoughts or prayers. They have had to evacuate their home due to the Waldo Canyon Fire.

    Has anyone heard from Lynn? That fire is way too close to him, and I've been wondering about him.

    I'm doing fine. I got to work from home for a couple of days.

  • Lynn Pettis (7/1/2012)


    WayneS (7/1/2012)


    Lynn Pettis (6/26/2012)


    Mandatory evacuation area has expanded on the North West side of Colorado Springs. The area now includes the area where I currently work.

    Waiting for email updates to know what our next steps are regarding work. I am glad I live on the South East side of town.

    Please keep a close friend and his family in your thoughts or prayers. They have had to evacuate their home due to the Waldo Canyon Fire.

    Has anyone heard from Lynn? That fire is way too close to him, and I've been wondering about him.

    I'm doing fine. I got to work from home for a couple of days.

    :w00t::w00t:

    Glad you're doing fine! Enjoy the change in work scenery.

    Wayne
    Microsoft Certified Master: SQL Server 2008
    Author - SQL Server T-SQL Recipes


    If you can't explain to another person how the code that you're copying from the internet works, then DON'T USE IT on a production system! After all, you will be the one supporting it!
    Links:
    For better assistance in answering your questions
    Performance Problems
    Common date/time routines
    Understanding and Using APPLY Part 1 & Part 2

  • Ouch!

    Is this another reason not to use cloud technology?

    http://redmondmag.com/articles/2012/06/20/malware-targeting-banking.aspx

    http://www.mcafee.com/us/resources/reports/rp-operation-high-roller.pdf

    Brandie Tarvin, MCITP Database AdministratorLiveJournal Blog: http://brandietarvin.livejournal.com/[/url]On LinkedIn!, Google+, and Twitter.Freelance Writer: ShadowrunLatchkeys: Nevermore, Latchkeys: The Bootleg War, and Latchkeys: Roscoes in the Night are now available on Nook and Kindle.

  • There needs to be stiffer laws that are enforceable around the globe related to breaches.

    It is a Whack A Mole world out there.

    And it sure doesn't help when many are clueless to many of the online risks.

  • Help me out - I recognize that security is a concern when hardware is remote, but I didn't see anything in the article that would be different in a cloud vs. traditional infrastructure. What did I miss about the obviously obvious connection?

    The most sobering part for me was the difficulty of detecting issues from the consumer standpoint (modification of account balance reports, interception of messages).

  • Chad Crawford (7/2/2012)


    Help me out - I recognize that security is a concern when hardware is remote, but I didn't see anything in the article that would be different in a cloud vs. traditional infrastructure. What did I miss about the obviously obvious connection?

    Because it's all happening in the cloud, user interaction is not needed by the hackers. They can automate the whole thing and not be as traceable. Not to mention the fact that with cloud data they can get that whole transaction poisoning thing (altering amounts & balances) going on.

    When the data is held down in a WAN / LAN "local" setup, there's a lot more accountability (hence more security) which requires a more manual touch on the systems.

    At least, that seemed to be the point in the documentation I read. I am not enough of a security expert to dispute this claim:

    Article (first link)


    ...malware that uses automation in its operation would not be possible without the spread of cloud-based technology.

    Brandie Tarvin, MCITP Database AdministratorLiveJournal Blog: http://brandietarvin.livejournal.com/[/url]On LinkedIn!, Google+, and Twitter.Freelance Writer: ShadowrunLatchkeys: Nevermore, Latchkeys: The Bootleg War, and Latchkeys: Roscoes in the Night are now available on Nook and Kindle.

  • BTW, Today's "The Joy of Tech[/url]" rocks!

    Brandie Tarvin, MCITP Database AdministratorLiveJournal Blog: http://brandietarvin.livejournal.com/[/url]On LinkedIn!, Google+, and Twitter.Freelance Writer: ShadowrunLatchkeys: Nevermore, Latchkeys: The Bootleg War, and Latchkeys: Roscoes in the Night are now available on Nook and Kindle.

  • Brandie Tarvin (7/2/2012)


    Chad Crawford (7/2/2012)


    Help me out - I recognize that security is a concern when hardware is remote, but I didn't see anything in the article that would be different in a cloud vs. traditional infrastructure. What did I miss about the obviously obvious connection?

    Because it's all happening in the cloud, user interaction is not needed by the hackers. They can automate the whole thing and not be as traceable. Not to mention the fact that with cloud data they can get that whole transaction poisoning thing (altering amounts & balances) going on.

    When the data is held down in a WAN / LAN "local" setup, there's a lot more accountability (hence more security) which requires a more manual touch on the systems.

    At least, that seemed to be the point in the documentation I read. I am not enough of a security expert to dispute this claim:

    Article (first link)


    ...malware that uses automation in its operation would not be possible without the spread of cloud-based technology.

    Not sure I agree with that. Automation is taking hold, especially as things like SVMM and other System Center technologies take place. MS is pushing the whole automated runbook thing, which means more automation, more standardization, and more exploitation of any hack.

    I would guess that it's easier to detect things in the cloud, if only because MS, Amazon, etc have more $$ to throw at monitoring. Whether they will is another story, but I'm not sure I think that a cloud service is more or less vulnerable than an on premises solution. It's possible that people will throw more blame at the cloud and away from themselves, but I'm not sure that speaks to any technical issue.

  • Steve Jones - SSC Editor (7/2/2012)


    Brandie Tarvin (7/2/2012)


    I am not enough of a security expert to dispute this claim:

    Article (first link)


    ...malware that uses automation in its operation would not be possible without the spread of cloud-based technology.

    Not sure I agree with that. Automation is taking hold, especially as things like SVMM and other System Center technologies take place. MS is pushing the whole automated runbook thing, which means more automation, more standardization, and more exploitation of any hack.

    Do you think McAfee is reading the data wrong?

    I guess the question is, if they are, why hasn't this type of automation been done before cloud tech?

    Brandie Tarvin, MCITP Database AdministratorLiveJournal Blog: http://brandietarvin.livejournal.com/[/url]On LinkedIn!, Google+, and Twitter.Freelance Writer: ShadowrunLatchkeys: Nevermore, Latchkeys: The Bootleg War, and Latchkeys: Roscoes in the Night are now available on Nook and Kindle.

  • I guess I don't see how the cloud facilitates automation. I would think that whatever you automate in the cloud could have been automated non-cloud as well. What I didn't think about before is that if the exploit's connection back to "home" is in the cloud, it could make it more difficult to track the source down and the servers are more mobile. That makes sense.

    At least, that seemed to be the point in the documentation I read. I am not enough of a security expert to dispute this claim:

    Me neither.

  • Brandie Tarvin (7/2/2012)[hr

    Do you think McAfee is reading the data wrong?

    I guess the question is, if they are, why hasn't this type of automation been done before cloud tech?

    I'm not sure. I'll have to read it more carefully when I have time. Automated attacks like this have been done before. Much of the man-in-the-middle stuff happens, and it doesn't matter if it's a cloud or on-premises.

    The automated server side stuff happens anywhere as well. The detection/reaction part is the only different thing I can see. Is this worse in the cloud? hard to tell.

Viewing 15 posts - 36,736 through 36,750 (of 66,815 total)

You must be logged in to reply to this topic. Login to reply