Wednesday, September 23, 2009

IT People Have Asperger Tendencies?

This article (click here) is really kind of a duh for people like me, who are utterly bathed in technology work.

It doesn't specifically address tech people as having Asperger's, but the tendencies it describes seem to be VERY common among people who fit into the server room and they are tendencies that seem to be fairly common with Aspies. I'm just saying there's overlap. Not that you're an Aspie if you work in technology.

The article is pointing out how (among other things) tech people value logic and reason over social graces; they'd rather work for a curmudgeon who's right than a pleasant but incompetent person.

My first thought: "Duh."

It's true that incompetence means more work is created by well meaning but incompetent people. We don't want to go back and redo things. We don't like the idea that there's "never time to do it right but there's time to redo it later". Getting things right in an efficient way is valued; this is something that is really overlooked by management more often than not.

I also thought it was interesting that the editorial brought up that when techies complain, it's part of their respect. They are expressing their opinion, their experience, and when it's "managed" out of them to express these ideas they stop telling their managers why something is a stupid idea. Managers..."normals"...think they're doing a good job of making you more pleasant. In reality, it fosters contempt and is a sign of disrespect (from the techie) because now their boss, manager, supervisor, idiot coworker, isn't worth sharing information with. It's another reason for the job to a rut where the techie feels they aren't valued.

It was an interesting read that I wish more of our users would read and understand...

Tuesday, September 22, 2009

Twitter as a Teeny Bit of Microblogging Fun

I finally did it. I broke down and created a Twitter account.

For those who have been hiding in the desert for the past couple years, Twitter is a microblogging site that lets you post quick messages, 140 characters or less, to legions of fans (or in my case, myself).

It's another social networking site; the kind I sort of blasted previously regarding Facebook. Twitter only has spambots, so far...I had three "girls" following me within two minutes (following means they're monitoring your "tweets", or updates) telling me how they loved hot guys. I blocked them right off the bat.

It's kind of neat in that it is convenient; I can send updates from my phone (unlimited texting to number 40404 after you register your phone), my iPod over wifi, my computer,...there's only about have a metric f***ton of applications dedicated to monitoring and updating your twitter account.

The truth is that I started monitoring several accounts from the web, and eventually it just got to be a pain in the butt. I had started checking in on a college student with a real knack for utilizing social media in ways most authors could probably take notes on (I don't know how she does it and still has a life to blog about!), a local journalist that gives some interesting insights to what people are like offscreen, Mur Lafferty (an author I have blogged about several times before), and a few others that are just really funny. I'm still expanding the number of people I'm following.

I wanted a way to consolidate them all from a simple interface; everything I installed, however, required me to register an account. So I registered. I set up my phone. I figured if I was going to have another account, I might as well give it an honest try before hating it.

I'm thinking of using it for notes, like web sites I want to make note of or notes to myself. I don't know yet. It might be a good tool for trying to get rid of my "wordiness" problem, since each tweet is limited to 140 characters.

The only thing I REALLY have to careful of is being too honest. It's too easy to want to spew some random brain fart that could land you in hot water, especially if it's about work or personal things. You can hide your tweets (make them "personal") so only friends can see them...but still, it's a risk that too many dippy teenagers (and a worrying number of adults) don't think about now. So basically I only post things that I wouldn't mind my mother seeing.

(Another issue is that with my brain's goofy wiring, I still say things that are inappropriate...so says my wife, anyway.)

Anyway it's an experiment. No, I can't share the link here since it can reveal a bit too much about my superhero identity. Some of you already may know who I am. Others, if you're really curious, feel free to leave a comment with info on how to contact you and if I am adequately removed from you professionally I'll let you know who I am.

Saturday, September 12, 2009

Overnight Delivery in Just Four Days

I recently had the good fortune of discovering my CPU cooler's fan had seized up. If you're unfamiliar with the internals of your computer, modern processors get hot. Very hot. Like, burn your bare finger hot. If allowed to stay that hot, it seizes up and dies. Or with today's processors they have a sensor that triggers when they overheat and the computer goes into thermal shutdown...*bloop*.

The CPU cooler is a radiator that is designed to pull heat off the processor and circulate it out of the case. On my particular computer the cooler with the radiator baffles is bigger than my fist, and mounted on it is a fan to push air through the baffles and keep the processor at a cool 50 degrees Celsius, give or take, depending on the load I'm putting on it.

Well, without air circulating through the baffles, the thing will heat up. Fortunately my computer, built by Puget Systems, is built like a tank. The freakin' thing warmed up, but not enough to kill the processor. Nice work! It had enough redundancy with cooling inside that the system was kept safe. My computer has a case with a clear panel on the side, so I just looked over and saw that the fan was seized up.

It happens over time. Dust, age, worn bearings...fans die.

A side note-while waiting for the new part, I installed a program to read temperatures and display them on the panel at the top of my Linux system's desktop. I had temps...but what was too much? I emailed Puget and asked them, along with current numbers. Their techs emailed me back the next business day with assurance that the numbers were well within tolerance. I emailed back a thank you, and they emailed again telling me, "Hey, no problem, any other questions don't hesitate to let us know." This computer was purchased a few years ago...they still were uber-responsive to me as a customer. Strong incentive for me to look to them for my next set of systems, if I don't go with a Mac-centric home...

Anyway, I ordered a new one on NewEgg, a great source for techie toys. Exact same model cooler. This was a Thursday night. I specified, next day UPS, expedited order. Cost me a total of $65...twice as much as the cooler alone.

My wife said I probably wouldn't get it on Friday. I didn't.

I got it Monday night.

Oddly enough, I'm still going to be billed for overnight delivery.

In a time when packages could be tracked to the point when they're dropped on my porch, why am I paying for what I'd like my delivery to be, instead of what the delivery ends up being?

I shouldn't have to pay overnight when I didn't get it for FOUR days!

Am I the only one that thinks this makes some sense?

Friday, September 11, 2009

What Is That Program Doing? Or, Why Is This System Using So Much Memory!?

First, let's get a quick concept out of the way. When dealing with computers, new sysadmins have to understand that when it comes to a system compromise (a computer gets hacked), the system cannot be trusted. It's like asking a person to objectively assess their mental state; when you ask a person's brain to evaluate itself, it's going to be biased and distorted. Similarly, when a person cracks a computer system, they can alter the programs and filesystem so that if you run utilities to show network connections, running programs, etc., the altered files will hide the unauthorized activity.

Pretty simple, yeah?

So how do you see unauthorized activity? If your computer was hacked and is now sending spam email...which is network activity...but if you run utilities everything is showing up as normal (because the altered files are hiding the unauthorized network activity), the computer can hide what's going on, but a second system on the network that is monitoring network activity will see all the activity. In other words, your hacked computer may have its fingers in its ears yelling, "LA LA LA LA LA" but a third party system will still see what that computer is doing.

You add a layer of abstraction to watch what's going on, and in the process you can learn a bit about what is actually going on with your computer.

Now...the topic of of the post.

I have been working with a technology called virtualization for some projects at work. It's really great stuff...it lets you create computers that exist only in software, letting you install and configure multiple computers that run on just one system. Schizophrenic, but very very handy for people like me that have to run print servers, web servers, and file sharing servers in an organization among other things because I can consolidate those systems onto one or two actual physical systems (with tons of RAM and disk space).

In the process of running tests to migrate some of our physical systems to virtual software systems we moved a printer server. This is a Windows computer whose entire job on our network is to spool print jobs and dole them out to our many many printers scattered around several buildings. Not uncommon in businesses to have printer servers configured in their network for easier management.

Normally we'd think that this isn't a huge task, either. Most of the time a server like this would sit largely unused; I mean, it just sits waiting for someone to send a print job, render it then send it to the appropriate printer. It's not crunching numbers to predict the weather.

"But Barry," you ask, "What does this have to do with hackers and second computers to watch what a system is doing?" Glad you asked. See, when you run a full-on virtual server system...in this case what's called a type 1 hypervisor...you get an abstracted view of a computer; memory use, disk use, network use...and so you can get a quick overview of what the computer is doing that ordinarily you wouldn't get to see with a physical computer.

What I saw was that out of (more than five, fewer than ten systems) on our virtualization server the printer server was taking up nearly 800 meg of memory and shooting between first and second place for CPU usage and network usage, depending on what the other systems virtualized on the testbed were doing at that point. What in blazes is it doing?

I logged into the machine and ran a wonderful tool from the sysinternals suite called Process Explorer (free download...I highly recommend the sysinternals suite of software to ANY system administrator or troubleshooter). From there I could monitor process (program) names, the command line from which they were running, memory and CPU usage, etc.

I found a couple things of note. First, the converter program I used to automagically convert the physical machine to a virtual machine runs a service that carries a large footprint of memory; now that the system was virtual, the converter program isn't needed. So I removed that program from add/remove programs and memory use for that virtual image dropped over 100 megabytes.

Second, the computer is running a database program as well as a Bash shell spawning Java. Huh?

In case you didn't know, Bash is a shell program that runs normally under a Unix system (like Linux), not Windows.

Process Explorer told me that both the database and the Bash shell (and in turn the Java system) was tied to a Dell utility tied to Openmanage. Many mental scars remind me that OpenManage is a set of utilities made by Dell for managing their servers...usually it has functions for things like monitoring fans and CPU temps, rebuilding RAID arrays, etc. etc...generally a headache to sort everything out and get working in the proper combination for your system. At least, that's my experience with it.

So I go into add/remove programs to remove the OpenManage software, since now that the system is virtual there really wasn't any Dell hardware for it to manage.

Surprise! I was wrong. Apparently at some point someone installed an OpenManage component for managing printers! It wasn't small either. In the add/remove programs there was a listing for "Dell Printer Software" and for "OpenManage Printer Manager", each of which was taking 1.6 gigabytes in storage space on the hard disk. Each. Not both together.

But since some departments wanted Dell multifunction printers on the network and I didn't install it I don't know if these software packages are something that are needed so I can't really just tear through and uninstall those programs without dealing with the possibility of Nasty Consequences(tm).

Apparently Dell tries to cut some corners to make their software more portable between Linux and Windows by using Java (I'm speculating since I'm not too thrilled with OpenManage software, so I don't install it on my Linux systems on Dell hardware). Part of their software workflow involves using a program called Cygwin to do something with logging or some management task; Cygwin is a port of Unix utilities to run on Windows (that's why I saw Bash running). You can run tools like Secure Shell or awk or sed or ls...many many many scripting and administration utilities...on Windows that normally you'd only see on Linux. Process Explorer popped up lines in the process list as some of these scheduled tasks were periodically popping up thn disappearing, no doubt adding to the memory and resource use of the virtual machine. To be clear, Cygwin has it's place and I think it's great when properly used. I've also seen it installed on systems that suddenly start spiking CPU usage because of one of the programs using Cygwin libraries (in that case, SSHD running on Windows as a service).

What lessons can we learn from this little educational field trip?
  • Generic is good. Addon software is bad. Backed up by anecdotes on the StackOverflow podcast, that CD that came with your camera/printer/device should not be installed unless you have no other choice but to use it to get the device to work. Many modern operating systems include drivers to work various media devices, or for devices like HP printers, you often can go right to the website and download just the driver, without all the addon crap that will bog down your computer with extra programs that you don't need (or know what they're really doing).
  • Virtualization can give you tools that will both teach you about using your system and open your eyes to some things your computer(s) may be doing in the background without your knowledge. There's no reason that a printer server should be sucking down resources like this one was except that it had some poorly optimized software installed that it probably doesn't need.
  • Third party utilities like the Sysinternals Suite can help you track down oddball activity on your system (or insights on how things work) for free. There are tools that tell you what's connected to the system over the network, which program is writing and reading the hard disk, which program is hitting what part of the registry, and many other useful tools. Try it out if you run Windows.
  • Audit your system once in awhile to see what's actually installed and what it's doing. If it's not needed, free up the drive space by uninstalling that program. Use Google to figure out what the programs are. Part of what contributes to your computer slowing down over time is having programs running in the background that take up space in memory and access the network and you probably don't need them. Become familiar with your system and it can help save you aggravation down the road...also it'll help you later on when you notice something that should not be in that process list running, so you can tell when something is out of the ordinary on your computer. Process Explorer even includes tools for you to Google process names from a menu, making it even easier to learn about what your system is doing!
Windows isn't the only platform to suffer from bloated, inefficient and/or poorly designed software, but since Windows has the majority of users who are non-technical in interest and nature it is the platform with developers who get away with creating shovelware much more often. Fight it by not using it. I'm not referring specifically to Windows, although I encourage not using that too...but rather don't use the bloated crap that comes as trinkets and addons that only serve to bog down your computer. Don't install software from CD's that came with your new tech toys unless you must; try plugging it into the computer first to see if Windows or Linux or the Mac recognizes the hardware and installs the necessary drivers for you first. Then you're using native tools and not someone else's idea of how you should use their tools (and sometimes screw up your system in the process). Check your computer and screen it for odd behavior and find out what those processes in the background of your system are doing so you can get rid of software that is slowing your computer without justified cause.

Anyone have any stories they'd like to share?

Sunday, September 6, 2009

The iPhone Vs. LG Voyager

It's official. The iPhone 3GS has smashed records for AT&T and Apple.

I would love to have an iPhone but the only carrier in the US is AT&T and I'm already quite invested with Verizon. Every carrier has horror stories associated with them, but in our relations with Verizon we've had good luck with customer service as well as technical service.

AT&T didn't come into our area with coverage until late in the game and when they finally did put in tower coverage the coverage was unreliable and spotty.

In other words, they left a bad taste in my mouth after seeing how they ran their business. If you followed my blog you know how I feel about businesses that seem incompetent with their customer relations.

I'm told that they're better today. I don't particularly care. There's a similar effect for restaurants. It's quite common for a restaurant to work long and hard at building a loyal number of regulars, but it takes only one bad experience to lose a customer forever.

That doesn't mean I don't wish I had an iPhone. I have an iPod Touch, the iPhone's close cousin, and I owned a Verizon LG Voyager. The iPod gives a pretty close experience to what an iPhone is like in most areas other than actually calling and texting (and a couple other features like taking photos and GPS, since the hardware isn't available on an iPod). The iPod does give the computer integration, music, podcast, and touchscreen as well as close form factor to the iPhone as well as the app store integration. It runs the same operating system as well.

Having used both the iPod Touch and Voyager, I can tell you that the interface to the iPod is light years beyond the Voyager and it's Verizon technology kin.

The touch interface on the iPod is responsive and probably three to four times more accurate than the Voyager's.

The app store on Apple is convenient and makes the iPod more flexible. Yes, Apple acts as the gatekeeper for all applications on the iPod and you won't (intentionally) find porn-based applications on the iPod/iPhone, but overall there are a simply huge number of various applications to choose from and they aren't tying you directly to Apple's brand overtly. Verizon requires you to do everything through Verizon and they're quite limiting in what I could and couldn't do on their phone.

The iPod allows for wifi access. Not so sure about Verizon's phones. It's not on the Voyager.

The iPod/iPhone was integrated with my computer. I could back it up and sync data easily with my computer, without having to find some kind of accessory kit with the proper cable for use with my particular phone. There are even applications to allow you to explore and navigate your iPhone/iPod from your computer. My Verizon phone was very much a separate accessory; it is as if Verizon is afraid of diluting their brand by allowing the customer to have any control over the product.

The only place I preferred my Voyager was the tactile keyboard. I could type significantly more quickly than on my iPod. However I could learn to work the iPhone's key display in a pinch (on the Voyager you almost had to get proficient with the full keyboard; the touchscreen was horribly inaccurate and lagged, making it nearly impossible to use.)

The Voyager was barely usable with the touch screen. For anything more complicated than viewing text messages I often had to drop to using the keyboard to get anything done; I can't count the number of times my phone thought I wanted to edit or view a contact entry when I was trying to get the damn thing to scroll. The iPod? No problem. If anything the iPod was almost too responsive, the screen just begged to be touched. The Voyager was so finicky and glitchy that it was just the opposite.

I don't know if it's a problem with Verizon just not "getting it" or if they're so stuck in some paranoid business model of controlling the brand rather than creating a great customer experience that limits them so much. Verizon has a great network, I've had excellent luck with coverage. The services offered by their website have worked well for us.

Now I just wish they had good products to match those services. I'm hoping that at some point Apple will cut their exclusivity with AT&T and create a product with Verizon...so far Verizon has show zero ability to "get it".

Friday, September 4, 2009

MyLife.com : Be Careful Who You Sign Up With Online

I had an email arrive from a friend recently that raised an eyebrow. It said that my friend wanted me to confirm that I knew him to a site called MyLife.com.

Hmm...

This isn't the first time I've seen emails like this before, and the're almost always trouble. Usually the person named as the sender doesn't even know that "they" sent it to me...and like most of these sites, my suspicions were quickly confirmed.

Check it out:
"Just Say No To Mylife.Com"
"MyLife.Com: A New Tool for Bargain-Seeking Stalkers."

Things are rarely really "free"; in this case, these sites take it to a new extreme in order to invade your privacy. This website downloads your contact information on your email and social networking sites then contacts people in your name to try getting them hooked into their snare to further marketing efforts; and once you're in, good luck getting back out.

Much like urban legends perpetuated with emails by everyone and their grandma, these underhanded websites spring up all the time with various names and never seem to go away. By the time people realize what they're really up to it's too late. Your information is out there, and everyone you have in your email has been spammed. It's not like there's one or two of these...they change tactics periodically to escape having their tarnished name hinder profits; the articles I linked above reference a few other names that website company is associated with, for example.

The lesson here is to double and triple check the fine print of sites you're looking at signing up with. Do a Google search for the name of the site and the word "spam" or "scam" to see what, if anything, pops up...before you click that ok button. You may not know what you're actually allowing and all the security in the world won't protect your computer when you give permission to install or upload their weaselware. It should became a second nature just like verifying your emailed "I can't believe this outrageous claim" should be verified on Snopes before you help pass it on with the forward button.

I'm not mad at him. If anything I'm mad at the company for using such weasel tactics to take advantage of people on the Internet. Those web weasels are no better than spammers clogging our junk filters and choking our bandwidth with attempted hijacking of our computers and emails attempting to evade filters.

Thursday, September 3, 2009

Facebook and Other Social Networking Value

I have a Facebook account. I was curious about just who I might know on the network; thought maybe I could find out some interesting things my classmates are up to now after so many years.

Small confession...if there's a Barry Atric there, it's not me. I'm techy, and occasionally techie, but not like here.

Anyway the primary reason I made the plunge was because I was looking for a few specific people from my college alma mater; I didn't find him there, but I did find many others that I thought had disappeared.

The web has plenty of tools available for people to use for expressing themselves in various ways (no, not talking about porn...although I guess there's venues for that too). Twitter, Facebook, Myspace, YouTube, even Blogger...all wonderful sites for stroking your virtual ego to no end.

I lately have questioned the value of using Facebook. I occasionally see something interesting, like finding out about an old aquaintance being attacked by a dog or someone else getting lost on a hike in the woods and having to spend an extra day in the wilderness with her husband until finding their way out the next day.

Far more often, however, I see updates about how Billy wants me to join a mafia war (what the hell is that?), or some other bulb managed to get a high score playing a virtual gardener. Worse are the quizzes; I think they're originating from some dimwitted kindergarten class. I took one quiz off Facebook when I first saw an interesting one about Star Trek; one of the questions had an answer that was one-hundred percent wrong. Wrong wrong wrong.

I was rather curious about this. That's when I discovered that other people write the quizzes. You don't need to be qualified in any way, shape, or form. Any idiot that can type can create some "wunderful" quiz for others to take and pass on like a meme-virus on Facebook.

So people are spending tons of time into a black hole of playing crappy games (get a Pogo account, people) and taking quizzes that are as meaningful as what any 12-year-old could come up with when they're not sharing small tidbits of their lives to their "friends". At least, I think they are friends. Apparently there's a group of people that make it their mission to "Friend" as many people as possible. I think it's like some form of virtual street cred or electronic Viagra for them to be able to say they can share the fact that Furball went poop on a pile of clean clothes (hee hee!) with 984 seemingly random individuals.

It's getting harder and harder to cull useful material out of Facebook. I went there hoping to reconnect with old friends. I did that to a degree. I found one person who I was remembering from old albums by finding a mutual friend. The person I was originally looking for? Again, friend of a friend, finally. I found out that the mutual friend was still in touch with him when I saw him post pictures of my lost aquaintences' second wedding on the website.

Yeah. He got married again. He was my best man at my wedding...and I wasn't invited to the second wedding.

Another friend I reconnected with acted like kind of a jerk to a ribbing I commented on. He deleted the whole thing and replied as if nothing had happened, but I was rather offended that he'd have said what he said. Well, written. Rather than make it worse I just didn't say much of anything other than, "Man,...that was harsh, don't you think?"

He erased that with his other comments, but still...it bugged me.

Really. What good is Facebook?

I contacted a few people, but they rarely say anything. It's a cacophy of people advertising themselves or some small highlight of the day, and once in awhile making comments about what someone else does. The little blurbs take on a life of their own for a few minutes before being drowned out by the latest game score someone managed to achieve in VeggiePatch or on some meaningless quiz.

Meanwhile I'm sinking time into Facebook that I could have used to write a story or try getting some time in learning a programming language. It's my own fault, I acknowledge that. But I think that maybe I should cut some of that time on Facebook.

I've noticed that most of the people populating it seem to be more concerned with themselves more than what their friends are up to. Maybe I'm just imagining it, but really, what do I accomplish by using it? Most people don't say much of anything about what I'm up to. Most probably don't even care. Once in awhile I'll get something from someone as feedback, and I try commenting on other active status updates, but most of the time...nada.

Lately I've just been posting song lyrics and whatever music video I happen to be listening to as a YouTube link. I don't bother investing energy in trying to use it as a conduit for keeping up with people's lives or having them keep up with mine. If it were something they were intersted in I think they'd have emailed me.

Or they'd already know about this blog. The only one that knows more about what's in my head is my insurance-mandated psychologist with my journal (yeah, I keep a journal...it's easier than running through things in-session most of the time and I don't think he spends enough time on the Webbertubes to read my blog. I'm not so sure even my doctors at the baritric office still read it at all, to tell the truth...)

So do you use Facebook or Myspace or the other sites? Why? I mean, do you get any benefits from using the site? Feel free to share...

Sunday, August 30, 2009

Anyone Else Worked on a Commodore 64?

I am listening to The Ultimate Commodore 64 Talk. It was a talk given at the 25th Chaos Communication Conference last year; it was 64 minutes long with 256 slides (which if you're a geek you already can see the in-humor of that).

What was so great about the C64? It was no doubt one of the most flexible, hackable systems created for home users. That's probably the single biggest driver in creating a fanbase for the machine that persists today (don't believe me? The thing was released in 1982, and if you click here you can go to a website that is reportedly hosted on a Commodore 64. Yes, hosted. It's a web server running on a Commodore 64.

My first personal computer was a Commodore 128. I remember typing in my own BASIC programs (the built-in ROM booted straight to a BASIC interpreter), loading applications from five and a quarter inch floppies, and with the right key combination, booting to a Commodore 64 mode. My first introduction to the early incarnation of the Internet was by connecting an external modem...which really is just a device for modulating a digital signal to an analog signal, not necessarily something that connects to a phone line even though that's the most common use...and connecting it to a 2-meter amateur radio transceiver so I could hop from node to node on the digital amateur radio network, exchanging messages with other amateur radio enthusiasts and using a terminal to "chat" with people. Messages could also be passed through special gateways into different wired networks of bulletin boards and what was back then the fledgling Internet! At the time this was pretty exciting!

Listening to this talk and watching the slides brought back some memories...

Commodore will always probably be known as the company that screwed up a great platform, the Amiga, which again was used beyond what most systems would have lasted in the industry. Anyone remember the show Babylon 5? Seaquest? Max Headroom? The computer effects were rendered on Commodore Amiga systems. It also was ahead of its time for giving home users advanced (but affordable) sound, graphics, and multitasking abilities; this was a continuation of the tradition started with the C64, except for the multitasking ability.

The talk itself is all about the C64; it's in-depth at times, other times humorous, and the information covers a variety of topics from bugs in the processor to comparisons of how graphics looked in the beginning (with a Christmas graphics demo released in '82) to what advanced graphics were appearing years later to a humorous dig at Microsoft's Bill Gates ("If he can program the 6502, so can you." Apparently Gates included an Easter Egg in the code for the version of BASIC encoded on the C64.)

Parts of it will go over the heads of the majority of people out there (you see some assembly code, some diagrams of chips used on the C64...) but other parts will appeal to anyone with fond memories of this old but venerable technology. If you have an hour to spend reminiscing then check out this video!

Friday, August 21, 2009

Windows 2008: I Hate You

I recently had the joy of installing Windows 2008 Server at work in preparation to migrate an older server application to it. I put off moving to or using the latest versions of Windows because I read of many of the headaches for sysadmins that lay in store (in case you want to relate a little, ever use Vista? Well, 2008 is Vista with server capabilities, and a few consumer interface items stripped out...but keeping most of the security problems).

In my two days using it, I ran into this short list of things that truly annoyed the bejebus out of me.

I ran a chkdsk (check disk) on the drives to repair any potential damage after a power outage that outlasted the UPS (I know, what were the odds?). Ordinarily, you run chkdsk at bootup, you can check the results by looking in the logs for messages from WinLogon. I searched for five minutes through the list without finding it...because now it was under something called WinInit. In a way this was funny, since I wondered "Wininit gonna work right for a change??"...say it out loud if you don't get it.
Almost every site, including Windows Updates, including innocuous sites that I've visited for years, including common sites for additional software...required me to add it to a "trusted sites" list. Sometimes it wouldn't even tell me it needed it, some redirect or addon simply wouldn't work. It's an additional step that I don't need when I'm under pressure to get the server working and get things configured.
VNC doesn't work. It's a neat program from www.realvnc.com (which has a free edition) that allows you to remotely view and control your desktop console. It's a convenient way to get to the console, whoever's logged in...we often use it for remote troubleshooting. It has its own password mechanism so it's not reliant on the password for a particular Windows user. "But Barry, why use that when you can use Remote Desktop? You get two client licenses included!"-easy. If Administrator is logged into the console downloading something, and then I RDP in and log in administrator, due to idiot licensing restrictions my login will kill the other session. So if something is being worked on at the same time...poof! Gone. VNC just brings up the remote console because it's remote control, not remote access. Anyway, VNC comes up with an error that Windows won't allow it to run because it's an interactive process. Nice. Really nice.
They changed the Management Console. I used to be able to right click on "my computer", go to manage, then from the top of the tree right click on the "local computer" and from there enter the address of another Windows system on our network so I could view services, system logs, etc...well, no more! Windows 2008 uses the "Server Management Console". And I can't connect to other systems from it! How handy is that?! Well, it's not. Thanks to some other people who were annoyed at this they already solved the problem...I just created a batch file on the desktop that contains the line, "start compmgmt.msc", launching the old fashioned management console from which I can actually manage other systems.
The system logs on the server like logging a message about licenses being validated by WinLogon. Um...who or what is it validating against? Why...? I'm always a bit skittish about software "phoning home". We are using a server, with potentially sensitive data on it. Maybe it's just validating against something on itself, maybe to one of our Active Directory servers, I don't know. But it's annoying me.
Creating a share seems to get more of a burden with each release of Windows. I had to use a wizard now to create a simple share; Wizards are supposed to be a good idea for helping new users with tasks that may be unfamiliar. But wow..."provision share"? I wasn't sure what it wanted me to do with that at first. The familiar route...right click the folder I want to share and select sharing...now takes you to a mini-wizard that would not let me change the name of the share, which I needed to do. I believe I ended up going through a submenu in the server manager to create the share I wanted...through a bigger wizard. All I would like is to right click the folder, have a list of tabbed options, and go from there. Why is that so !@#% difficult? This is Windows Server, sharing is a very basic and common task for server admins. Why must it be a topic for a wizard, without a choice to not suffer through a @#$$ wizard interface? Or worse, an inconsistent interface, since there is more than one wizard to go through for sharing?

Maybe these are just initial impressions and I have to adjust to it. But my first impression was that it was a pain in the arse. VNC didn't work on it. Security notifications keep popping up, even for Windows Update! And common tasks have to be relearned. This is progress? You must seriously have to love the Microsoft Kool-Aid to embrace newer versions of Windows. I find it to be an giant pain to deal with...

Anyone else have similar experiences? Or reasons I should love this version of Windows? Please?

Tuesday, August 18, 2009

Windows Security Identifiers

This is another edition of Fun With System Administration.

Of course, by "fun" I mean I want to choke myself with a SATA cable.

See, much of my day job involves interacting with Windows systems, and there is never any shortage of reasons for me to pull my hair out.

The latest issue involves the Security ID, or SID. See, Windows, unlike Linux, identifies users and machines with a really long string of numbers and letter called the SID. Even though you might have a friendly username (like, say, your name...) when you go to use the computer in the background Windows knows you by a really long string of numbers. Your human-readable name is an alias of sorts.

Remember, I said users and machines have a unique ID associated with them.

The problem is that we have situations where we have to clone machines to go out to different offices. We take a machine out of a batch of identical systems; we install Windows, configure special software options and printers and various drivers, then we create an image of that machine that we then can copy down to all the other machines in hopes of saving time not having to remember every Windows and Office update and special software package.

Part of that procedure involves running NewSID, a free utility that will change the name of the computer and the SID so the machine gets a unique ID associated with it.

In the Wikipedia article it said:
Now the truth is that when the computers are joined into a domain (Active Directory or NT domain for instance), each computer has a unique Domain SID which is recomputed each time a computer enters a domain. Thus there are usually no real problems with Duplicated SIDs when the computers are members of a domain, especially if local user accounts are not used. If local user accounts are used, there is a potential security issue that is the same as the one described above when the computers are members of a Workgroup but that affects only the files and resources protected by local users, not by domain users.

Now...our users are on a domain! Maybe we don't have to worry about it!

I made note of it and had cloned several machines before remembering to actually test it. The latest NewSID will tell you the current SID for the machine; I looked at two systems on the domain and they both matched. Joining the Active Directory domain doesn't alter the machine's identifier as I thought.

Apparently the Access Control List that controls file ownership and such is associated with the user's SID, and in theory there shouldn't be an issue with this. But on reflection I didn't want to risk it.

Nuts.

So it was my own fault for not testing more thoroughly but it is one more reason to hate Windows...Linux doesn't use machine-specific ID's on the network outside of their name. Windows lets you change names but hides the fact that the name is just a superficial shell over a long string of gibberish (okay, it actually means something as the article tells you, but still...) and it's that string of gibberish that is actually significant; plus you need a special tool to alter it.

Another annoyance with Windows...it doesn't include the tool to alter these sort of fundamental parts of the operating system that can cause problems. You can get NewSID for free but it was actually a third party tool written by Mark Russinovich, hired by Microsoft after he released a lot of useful tools for Windows.

The lessons to be learned?

  1. Don't assume. Test. Even if it takes more time which results in becoming less popular with your boss because you're taking that extra time...because it's going to save you the time it takes to fix your time-saving shortcut.
  2. With Windows, even though you'd think changing names and ID's and such would make the machine unique on the network, it might not. There are underlying functions that Microsoft actually had the brains to abstract away from the users since they didn't need to know about it...only they didn't put any obvious ways to check on or monitor those abstracted functions until it's too late and you have a new mess to try fixing.
  3. Don't assume that just because there's some fundamental part of Windows that needs administration you'll have the tools included to fix those fundamental parts. Find a tool and save it somewhere that you can access that tool later on.
  4. Windows is a major pain in the rear.
I think that pretty much covers it...