| Horse Sense #57 
					Contents: 
 
					A Personal Touch on the Web 
					It is nice to have friends who do 
					interesting things.  For some fun, try one of these sites: 
					
					
					www.embroidme-springfieldva.com  Jason does 
					"commercial" embroidery for companies and high quality 
					screen printing.  I have a shirt with one of our famous dog 
					pictures on it that makes everyone laugh.  The picture 
					quality is excellent even though he surprised me by using a 
					card I mailed him to produce the image. 
					
					
					www.islandshirts.com  Lynn's mom runs this 
					business.  Lynn (a guy) wears these high quality Hawaiian 
					shirts that are so colorful they can cause hallucinations. 
					
					
					www.moonlightthreads.com  Cathy makes cute bibs and burp 
					cloths that are perfect gifts for baby showers.  My wife 
					loves them and we go through a lot of them in a week.  
					Fortunately, they hold up well to washing. 
					
					
					www.fruitsandberries.com
					 A former computer dealer correspondent of 
					mine left the business to sell fruit and berry plants.  Not 
					a day goes by when I don't think, "Hire me!"  I haven't 
					tried the berries because I don't have anywhere to plant 
					them. Chicken Little may be Right 
					Microsoft says recovery from malware is 
					becoming impossible: 
					
					www.eweek.com/article2/0,1895,1945782,00.asp New Trends and Developments 
					In May 2005, portable computer sales 
					outpaced desktop sales for the first time.  Portables have 
					become popular because they now rival desktops in 
					performance and capacity.  One portable can replace a home 
					and a work PC.  Their mobility is useful to travelers and 
					even those who just change cubicles or who want to work in 
					the conference room or library.  They take less space and 
					power than desktops.  But, as people become more and more 
					mobile, they encounter new issues and sets of risks.  
					Wireless connections aren't as fast as wired connections.  
					There are security, reliability, and use concerns.  Is your 
					wireless or wired connection safe?  How do you keep it from 
					getting stolen?  What do you do if it gets stolen?  What if 
					you drop it or something just wears out?  How can you 
					connect to all the devices you need?  What is the best way 
					to carry it?  How can you connect back in to your business 
					safely?  How do you back up the data?  How do you manage 
					users who might not be connected all the time to the 
					corporate network? 
					Seagate bought drive manufacturer Maxtor 
					for $1.9 Billion to become the dominant player in the disk 
					drive business.  Seagate owns the high end of the market 
					with its server drives and Maxtor owns a large part of the 
					consumer drive market, and especially, the external hard 
					disk drive market.  External drives are becoming more and 
					more important as backup devices for portables and can also 
					serve as additional storage for one machine or many.  
					Storage use is exploding as businesses and individuals store 
					more information on their computers.  Many businesses are 
					now asking themselves difficult questions.  Is the 
					information I am storing subject to any regulations?  How 
					long do I need to store something?  Where should I store 
					it?  What information is valuable and for how long will it 
					be valuable?  Who should have access to this information, 
					who shouldn't, and how do I control the access?  What is 
					involved in a disaster recovery plan?  How does this fit in 
					with my normal operations, my backup routine, and my needs 
					to have an archive of critical information?  How do I manage 
					this mountain of data without paying a fortune and spending 
					all my "free" time doing it?  For answers to these 
					questions, we suggest you call Iron Horse before you lose 
					critical information, the federal government fines you, you 
					get sued, or you simply end up working too hard and paying 
					too much to manage your information. 
					Chances Are You Are Using an 
					Insecure Browser 
					Microsoft's Internet Explorer (IE) has 
					been the default browser for some time.  However, it hasn't 
					had a major update in some time and is extremely vulnerable 
					to attack.  For security reasons, I and many of my clients 
					use Firefox.  It is a lot safer than using IE.  Tabbed 
					browsing is indispensable.  In one browser window, you can 
					have many sites open that you can switch easily between as 
					you might switch between tabbed folders in a file cabinet.  
					You can also save multiple tabs as a group.  Way cool.  The 
					speed is similar to IE, but Firefox flunks on some very IE 
					specific sites.  That's OK.  The code Firefox won't run is 
					the dangerous stuff IE will.  Firefox has plug-ins that will 
					make it more useful.  It doesn't take up much disk space or 
					memory.  IE normally takes a large chunk of your available 
					disk space to cache web pages.  This is a very wasteful use 
					of your computer's resources and can slow your access to 
					everything else and cause stability issues.  The Firefox 
					toolbar search window can search various sites.  The 
					download manager is good and sends the downloads wherever I 
					want them.  It is easy to clear specific configuration and 
					history data for security reasons.  Password management is 
					good.  Updates are quick and easy.  All in all, Firefox is a 
					great browser.  We only use IE when we can't use Firefox 
					because the site owner has done something non-standard 
					(dumb).  Firefox is also free.  Get it at
					
					www.getfirefox.com. Being able to download the full 
					product in a single download makes it much easier for 
					administrators to install and troubleshoot. 
					Is Your Network in Chaos? 
					Moving Towards Utility Networking 
					Most small business networks are 
					undocumented, unpredictable, not monitored or measured, 
					without a coherent source of help, and heavily dependent on 
					users and management staff to handle problems, generally in 
					a reactionary crisis mode.  It is a struggle just to 
					maintain the configuration and keep the business running.  
					Well managed networks resolve these issues and become tools 
					for enhancing the business and implementing policy.  While 
					these networks aren't completely automatic, they do behave 
					like utilities.  You expect them to work.  The costs are 
					reasonable and somewhat predictable.  The features and 
					benefits are well known.  There is copious documentation.  
					Help is easily available.  The benefits are measurable.  
					Contact Iron Horse to find out where your network lies and 
					see how you, too, can graduate from chaos to something 
					better. 
					Multifunction Companies, 
					Multifunction Appliances 
					Symantec has become the Borg of the 
					security industry, assimilating companies like Veritas, 
					PowerQuest, Axent, and other well known names to become the 
					800 pound gorilla of the security world.  As a Symantec 
					Enterprise Solutions Partner, Iron Horse has watched a 
					relatively small company become a multibillion dollar 
					behemoth in only a few years.  Fortunately, Symantec keeps 
					buying companies Iron Horse already represents, so we often 
					know the products better than their own technicians and 
					salespeople.  Sonicwall has also been on a buying spree 
					lately, buying Lasso Logic (disk to disk backup appliances) 
					and Enkoo (SSL VPN appliances).  What both Symantec and 
					Sonicwall have in common is their recognition that network 
					appliances are the wave of the future.  The most common 
					network appliances focus on security.  Unified threat 
					management products (firewalls with additional security 
					features like VPN capability, antivirus, antispam, content 
					filtering, etc) are a popular choice.   Both large and small 
					companies find buying a bag-o-securityappealing.  Since 
					multifunction security appliances consolidate multiple 
					security technologies in one place with one interface, it 
					makes them much easier to buy, manage, and support.  The 
					easier security is to manage and support, the more likely it 
					is to be effective. 
					Cymphonix Network Composer is a 
					"Bag-O-Security" 
					The Cymphonix Network Composer is so 
					amazing, I had to buy one for our network.  In simple terms, 
					it allows me to manage how our critical link out to the 
					Internet is being used.  For example, I can see who is using 
					the most bandwidth and what they are using it for.  I caught 
					one of my employees visiting web sites he shouldn't have 
					been on company time and had an "interesting" talk with 
					him.  For myself and other customers, I've used it to block 
					inappropriate web content, documented inappropriate use of 
					the network, to enforce internet usage policies, pinpoint 
					people abusing the network, to find infected machines, to 
					ensure business critical communications like voice and video 
					get priority over file downloads, to stop antivirus and 
					spyware downloads from web sites, to find misconfigured 
					machines that disrupted the entire network, and to generate 
					meaningful graphs and statistics to show how much better 
					things are with a Network Composer in place. 
					Some people have concerns about "Big 
					Brother" looking over their shoulder and monitoring 
					everything they do.  Well, you can monitor a lot with this 
					device, and surfing inappropriate web sites is a problem on 
					a lot of networks, but even if you make the assumption that 
					everyone that works with you is hard working and completely 
					trustworthy, you can still have issues.  Without the Network 
					Composer you couldn't see or correct problems like these: 
					(1)  Bob brings his daughter in to 
					work one weekend and lets her play on a nearby computer.  
					She decides to play a game over the Internet with some 
					friends.  A critical network backup doesn't complete. 
					(2)  Jill wants to keep in touch 
					with some friends visiting town and uses Internet Messaging 
					to do so.  Someone sends her a file which she executes and 
					infects the network. 
					(3)  Your part time bookkeeper 
					receives a message from your bank to confirm account 
					information and clicks on the link to provide it giving your 
					information to a thief. 
					(4)  You are making a voice over 
					IP phone call when one of your machines decides it needs a 
					software update from a manufacturer and begins to download 
					it.  Your call disconnects and you can't reconnect. 
					(5)  You discover an infected 
					machine on your network has been sending e mails with your 
					name on it out to thousands of people touting an investment 
					scam only because an annoyed customer calls you. 
					(6)  On a temporary basis, you set 
					up a link to a printer and fileserver at another office.  
					However, you forget to take that link down.  Months later, 
					two computers on the network are still running slow and your 
					link out to the Internet is slower than you expect it to be. 
					Do you know what is happening with that 
					critical link out to the Internet? You manage what you 
					cannot measure.  The problem is that good management is hard 
					to describe.  But, it is easy to see.  I believe you can 
					make great use of it on your network, or I wouldn't have 
					bought it for mine.  Cymphonix makes inexpensive appliances 
					for networks of all sizes.  We are so sure you will like it 
					that you can try out the unit for 30 days, and if you don't 
					like it, you can send it back for a refund on your credit 
					card or account.  We do this because no one has ever sent 
					one back.  If you are worried that you don't have the time 
					or expertise needed to install or manage such a device, we 
					can provide those services as well for a fixed cost. 
					Truth or Joke? 
					Have you ever wondered how your computer 
					works?  Well ... It's finally explained here in one 
					easy-to-understand illustration:   www.newportharbor.us/computerworks.htm (This animation may take a moment to load. No, we didn't think of it, but we like it!) 
 |