Tag Archive for 2012

IPv4 IPocalypse Strikes Europe

IPv4 IPocalypse Strikes EuropeThe IPocalypse has stuck in Europe. RIPE NCC, the Regional Internet Registry (RIR) for Europe, the Middle East, and parts of Central Asia announced on 09-14-12 that it is down to its last “/8” worth of IPv4 addresses. ArsTechnica reports it is no longer possible to get new IPv4 addresses in Europe, the former USSR, or the Middle East, with one small exception: every network operator that is a “RIPE member” or “local Internet registry” (LIR) can get one last block of 1024 IPv4 addresses. To fulfill these requests, the RIPE NCC is keeping that last /8, which has 16.8 million addresses, in reserve.

None of this comes as a surprise, according to the author, given that global IPv4 IPocalypse struck when the global pool of free IPv4 addresses dried up in February 2011. APNIC, which distributes IP addresses in the Asia-Pacific region, ran out of IPv4 addresses in May 2011. The remaining three Regional Internet Registries are AfriNIC (Africa), LACNIC (Latin America and the Caribbean), and ARIN (North America), which all have enough IPv4 addresses to last at least two more years.

Since the depletion of IPv4 address space in the APNIC region, little information has surfaced about how network operators in the region have managed the situation. The article states, the lack of IPv4 addresses only impacts organizations and consumers who need more addresses, or who need addresses for the first time. Existing IPv4 users remain unaffected by the global IPocalypse, and so the immediate impact is limited. Also, large network operators get large address blocks from the RIRs and they typically have a pool of unused addresses of their own, so few will be experiencing immediate problems.

Every year for the past five years, some 200 million new IPv4 addresses have been put into use. Ars cautions, without a steady supply of fresh addresses, many Internet-related activities are going to become problematic in the years to come. Fortunately, 20 years ago the Internet Engineering Task Force (IETF) foresaw the IPv4 IPocalypse, where the 3.7 billion 32-bit IPv4 addresses would run out, would become a problem, and started working on a replacement: IPv6. However, the IPv4 depletion didn’t happen as fast as the IETF originally predicted, and IPv6 adoption has languished.

rb-

So IPv6 adoption got a big kick in the implementation from World IPv6 Launch. Eventually, IPv6 will replace IPv4, but the transition won’t be pretty. I have covered some of the IPv6 issues here, here, and here. Give it some time, Europe and the rest of us will survive the IPv4 IPocalypse.

Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Everyone Snoops Thru Smartphones

Everyone Snoops Thru SmartphonesMobile device users lose almost 70 million smartphones per year in the U.S., about 30 percent of all the phones in use at any given time. According to one report only seven percent of the lost smartphones are recovered. Only 57 percent had any security, but 60 percent have confidential contact lists, emails, Internet and security codes and credentials for business apps or mobile-payment services.

Symantec logoEven if an honest person finds your mobile, security company Symantec (SYMC) says that the good Samaritan will look at the confidential data stored on the smartphone while trying to return it. The study (PDF) found that 96 percent of the people who found a mobile device planted by the security vendor peeked at personal data. People who found the smartphones:

  • Clicked on an app labeled “online banking” 43% of the time
  • Tried to run a remote-access/VPN app to access the fake network 49% of the time
  • Clicked on a filed named “HR salaries” 49% of the time
  • Opened a file named “saved passwords” 57% of the time
  • Checked social networking tools and personal e-mail 60% of the time
  • Accessed a folder labeled “private photos” 72% of the time
  • Checked out something on the lost mobile device 96% of the time

Online storage company Carbonite (CARB) reports that the data on a mobile device is valuable enough and the headaches involved in recovering it are big enough that 50 percent of Americans would rather give up all of a year’s vacation time than lose all the files on their smartphones.

rb-

Even though most Americans would give up their vacation then lose the data on their mobile devices they don’t take steps to prevent other from snooping through their data. Simplistic as it seems, one password will deter most casual snoops.Identity theft data lose and embarrassment can easily be prevented by using the password screen-lock that comes with all smartphones.

How to Set a Passcode

WikiHOW explains How to Set a Passcode on the iPad to prevent people from snooping through your Apple (AAPL) iPad2.

Open the “Settings” app and tap “General Settings”. Continue by opening “Passcode Lock” in the center box of options.
How to Set a Passcode on the iPad - Step 1

Scroll until you find the “Passcode” option, then tap it. If this is your first time enabling a passcode, “Turn Passcode On” will be the only selectable option. If your iPad supports Touch ID, this option will be called “Touch ID & Passcode.”

How to Set a Passcode on the iPad - Step 2

Turn Passcodes on by tapping the “Turn Passcode On” option.

How to Set a Passcode on the iPad - Step 3

Enter a six-digit passcode of your choosing. You’ll need to enter it again exactly the same way on the next screen to verify. Be sure that it is a combination you won’t easily forget, as well as one that is also hard for others to figure out. This has increased from 4 – 6 characters since I first posted this article in 2012.

How to Set a Passcode on the iPad - Step 4

Re-enter the passcode. Pay close attention as you type to avoid mistyping the passcode. If both your new passcodes match each other, you’ll be taken back to the “Passcode Lock” screen.

How to Set a Passcode on the iPad - Step 5

Press the lock button to lock your iPad. You still need to confirm that your passcode is active.

How to Set a Passcode on the iPad - Step 6
Swipe right on your iPad’s screen, then enter your passcode. Your iPad is now passcode-protected!You can change or remove your passcode at any time in the “Passcode” menu.

How to Set a Passcode on the iPad - Step 7

rb-

Apple has updated this process since I first wrote about putting a lock on your iPad in 2012.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers and anything else that catches his attention since 2005. You can follow him at LinkedInFacebook and Twitter. Email the Bach Seat here.

ITU Regs Bad for Cybersecurity

ITU Regs Bad for CybersecurityEmma Llansó at the Center for Democracy & Technology writes that the International Telecommunication Union is ill-suited to regulate cybersecurity. The United Nations-backed ITU will meet in December to try to expand its control over the Internet. The CDT believes that the issue of cybersecurity perfectly illustrates why the ITU should not be given expanded regulatory authority to include matters of Internet governance.

Center for Democracy & TechnologyThe UN body is holding the World Conference on International Telecommunications (WCIT) this December in Dubai, UAE to renegotiate the International Telecommunication Regulations (ITRs), the UN’s core telecommunications treaty. The ITRs were in 1988 and sets forth general principles for the operation of international telephony systems. The CDT reports that some Member States of the ITU want to use the WCIT to expand these regulations to Internet matters by amending the ITRs. The CDT and others have warned of the risks to online freedom and innovation if the UN is allowed to regulate the Internet. The CDT has released a paper (PDF) that examines in detail some of the proposals pending before the ITU relating to cybercrime and cybersecurity.

The CDT states that cybersecurity is undeniably a critical issue for the future of telecommunications and indeed for global commerce, development, and human rights. On the other hand, it is ill-suited to the kind of centralized, government-dominated policy-making that the ITU represents.

ITU logoCybersecurity requires agility: Given the pace of technological change, governmental bodies are not likely to be the source of effective technical solutions. The CDT predicts those solutions will emerge from multi-stakeholder efforts, involving ICT companies, technologists, academics, and civil society advocates, as well as governments.

Moreover, the cybersecurity issue inevitably leads straight into questions of human rights and governmental power: surveillance, privacy, and free expression. None of these are issues the ITU has any expertise in or any ability to assess and balance. The CDT suggests, rather than adopting vague wording that could be used by governments as justification for repressive measures, the ITU should endorse existing standards initiatives such as those underway at the IETF and continue to serve as one forum among many for the development of consensus-based, private sector-led efforts.

According to the CDT briefing, the Arab States regional group has offered a proposal to amend the ITRs to require Member States to “undertake appropriate measures” to address issues relating to “Confidence and Security of telecommunications/ICTs,” including “… online crime; controlling and countering unsolicited electronic communication (e.g Spam); and protection of information and personal data (e.g. phishing).” The governments of the middle-east have a history of manipulating the Internet to silence dissent.

Another example of why the UN should not control the Internet comes from the African Member States cybersecurity proposal which deals with data retention. The CDT reports the requirement will force communications companies to retain data about customers and communications for the benefit of the government rather than for business purposes.

UN against U.S. ConstitutionAnalysis by CDT says that this requirement goes against American criminal laws. This data retention law turns the presumption of innocence on its head since these cybersecurity data retention laws apply to every citizen regardless of whether they have committed a crime. Further, because data retention laws require service providers to store information that identifies people online, they threaten anonymity online, implicating the rights to both privacy and free expression.

The CDT writes that several cybersecurity proposals to amend the ITRs refer to the routing of communications. One proposal from the Arab States regional group would amend the ITRs to specify that “A Member State has the right to know how its traffic is routed.”

national securityThe proposal is justified on the grounds of security, according to the CDT which some Member States clearly interpret to mean national security. In its comments, Egypt argued, “…  Member States must be able to know the routes used … to maintain national security. If the [Member State] does [not] have the right to know or select the route in certain circumstances (e.g. for Security reasons), then the only alternative left is to block traffic from such destinations…”

The brief explains that Internet protocol (IP) networks transmit communications and interconnect entirely differently than traditional telephone networks; in that context the Arab States proposal to “know how traffic is routed” simply would not work and could fundamentally disrupt the operation of the Internet. If the Arab States proposal were applied to all Internet communications, the requirement that countries be able to “know” how every IP packet is routed to its destination would necessitate extensive network engineering changes, not only creating huge new costs but also threatening the performance benefits and network efficiency of the current system.

The brief goes on to explain that the Arab States proposal could also serve to legitimize governmental efforts to set up controls on the Internet traffic, by enshrining in an international treaty. Changes to IP routing rules to carry out the Arab States’ cybersecurity proposal could give the Member States more technical tools to use to block traffic to and from certain websites or nations. The regulations on routing that the Arab States proposal condones could take a variety of forms, from prohibiting certain IP addresses from being received inside a country to tracking users by IP addresses and blocking specific individuals from sending or receiving certain communications. “Knowledge” of IP routing could also encompass countries keeping track of what websites their citizens visit or with whom they email – all in the name of national security.

These types of regulations, which could be legitimized if the Arab States proposal is adopted, could threaten user rights to privacy and freedom of expression on the Internet.

rb-

The UN must not be allowed to expand its control over the Internet.  ITU regulation will be bad for cybersecurity.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

5 Tips To Make Meetings Less Painful

5 Tips To Make Meetings Less PainfulSalesCrunch has created a guide to “meetings that don’t suck.” The firm collected data from its management software, which tracks things like if people are really paying attention (looking at the screen or not), and if follow-up materials are opened. The BusinessInsider says the Web conferencing company crunched the numbers and came up with 5 good tips for the next time you call a meeting.

1. The 15-minute meeting. No meeting should last more than 30 minutes. After 30 minutes, they are giving one-quarter of their attention to something else.

2.  Everyone needs to talk.  If all participants talk, people will give the meeting 92% of their attention. If someone is yammering on, it gets only 78% of their attention.

3. Send follow-up materials within 5 minutes. Nearly two-thirds of attendees will read them within one day. A few more will be read the next day, but not many.

4. Shorter follow-up materials are better read. People will spend 52 seconds with a short follow-up. But they will spend only 10 seconds on a mega 100-slide deck.

5. Reach out via LinkedIn immediately. Nearly three-quarters of meeting attendees will accept a new LinkedIn connection after an online meeting.

rb-

Some of these I do better than others. I like to keep my meeting simple while trying to engage everybody in the conversation. My follow-ups tend to be more formal meeting notes so they take longer to get them out. So my meetings are less painful than others.

Don't Such at Meetings

© 2012 SalesCrunch

 

Related articles
  • Study finds web conferencing popular but underutilized (shoretel.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

IT Admins Switching Careers Due to Stress

IT Admins Switching Careers Due to StressHelp Net Security highlights a report from GFI Software which reports that 67% of IT administrators have considered switching careers due to job stress. IT administrators cited managers, users (employees), and tight deadlines as the biggest job stressors. GFI’s survey results (PDF) also revealed that IT professionals tend to work long overtime hours, with one-third working up to 10 extra weeks per year.

GFI Software logoThe independent blind survey, which polled 204 IT administrators in U.S. organizations ranging from 10 to more than 500 employees, gauged respondents’ stress levels at work and revealed their opinions on their main stressors, as well as how their stress level compares to friends and family, and how it affects their personal and professional lives.

Key findings from the GFI Software survey include:

  • Nearly 70% of all IT administrators surveyed consider their job stressful.
  • Greater than 67% of IT administrators consider switching careers on either an occasional (43%) or regular (25%) basis due to job stress.
  • 72% of respondents consider themselves either just as stressed as or the most stressed compared to others in their social circle.
  • While less than half (47%) of IT admins at companies with between 10 and 49 employees say their jobs are stressful, that number skyrockets to 83% when those at companies with between 50 and 99 employees are polled, representing the most stressed group in the respondent base.
  • The top three sources of stress for IT admins are management (28%), tight deadlines (20%), and the users they support (18%).
  • IT admins in the Northeast are the most stressed in the country (74%). Midwesterners are the least stressed, with nearly two-thirds (64%) still saying their job is stressful.

their job has affected their personal lifeIn addition to the stressors themselves, IT admins also told GFI that they routinely put in many overtime hours beyond the traditional 40-hour workweek. More than one in three (36%) say they work eight hours or more of overtime during an average week, which adds up to nearly 10 extra weeks per year.

Nearly 85% of respondents feel as though their job has affected their personal life in some way. According to the survey results, respondents have:

  • Lost sleep over work (42%)
  • Missed out on social functions (40%)
  • Missed time with their kids (39%)
  • Canceled commitments to friends and family due to work (35%).

Additionally, many GFI survey respondents say their jobs have even affected their health. Nearly one in four (22 percent) say they don’t feel great physically and 20 percent say they have experienced stress-related health issues, such as high blood pressure.

rb-

The article concludes with Phil Bousfield, general manager of GFI Software’s Infrastructure Business Unit who says; “IT is a critical component of a company’s success.” He says, “firms … need to take these findings as a wake-up call, and ensure their IT staff is supported, productive, and armed with the tools they need to be successful. Doing so will deliver business value and help IT admins have a better work-life balance.”

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.