Diary of a Network Geek

The trials and tribulations of a Certified Novell Engineer who's been stranded in Houston, Texas.

4/29/2016

Evernote IT Documentation Templates

Filed under: Fun,Geek Work,Never trust a Network Admin with a screwdriver,Red Herrings,The Day Job,The Tools — Posted by the Network Geek during the Hour of the Hare which is terribly early in the morning or 6:30 am for you boring, normal people.
The moon is a Third Quarter Moon

Prepare yourself for some high-intensity geekery!

No, seriously.
So, I’ve been contracting somewhere that has virtually no network documentation and what little they did have got destroyed in a catastrophic event.  For privacy and security, not to mention client confidentiality, I won’t go into details on that.  But, as a result, one of the things I’ve been doing is rediscovering their network and documenting it as fully as possible.  For that, I’ve been searching out and using various templates.
Also, in a seemingly unrelated course of events, I’ve recently started using Evernote as part of my Getting Things Done revival.  I’ve been re-reading Getting Things Done, originally in preparation for starting a new job, and trying to get it going again in all areas of my life to better manage my time and efforts.  My wife raved about both GTD and Evernote, so I splurged and bought the $10 document from David Allen’s web store on setting up Evernote so that it was optimized for GTD.  It was some of the best money I’ve spent in a long, long time.  This combination is so completely awesome!

But, what’s even more awesome is the power of Evernote templates.  Their templates are really just a blank document that’s formatted in a particular way that serves as a starting point for a regular note style that you make over and over again.  They’ve written up a whole article on it; How-to: Save Time with Templates.  If you’re working with Evernote, it’s definitely worth the time and trouble.  My personal template library is hitting 59 items right now, but I’m sure there will be more.
And, that, finally, leads me to my Friday Freebie; EvernoteITDocumentationTemplates. These are a collection of six templates, so far, that I’ve munged together to let you more easily record the basic information an IT professional might need to capture about devices on their network.  I have no doubt there will eventually be more.  In any case, go ahead and download these and enjoy them.
To get those into your personal Evernote, check out their article How to Backup and Restore Notes and Notebooks.  It’s got step-by-step instructions there for getting started.
Good luck and enjoy!

8/2/2011

Android Virus

Filed under: Geek Work,MicroSoft,News and Current Events,The Dark Side — Posted by the Network Geek during the Hour of the Rooster which is in the early evening or 6:51 pm for you boring, normal people.
The moon is Waxing Crescent

No, not a flu that your synthetic humanoid might catch.

Virus writers target operating systems with a large installed user base.  There’s nothing controversial or even particularly interesting about that statement.  It’s a generally accepted concept based on observation, if not actual hard facts.  For a long time, that’s why there were so many viral attacks on Windows.  Windows enjoyed the greatest market penetration, so Windows users had to put up with the most frequent attempts to penetrate their machines.
But, that’s changing as the distribution of operating systems changes.  Android, in various forms and flavors, is now the most installed operating system.  Yeah, that’s right, someone has been writing viruses (virii ?) that attack your Android phone.

I’ve seen two new stories about this today.  One from a Houston local tech celebrity, Dwight Silverman over at the Houston Chronicle, and elsewhere, both talking about a new Android Trojan that can actually record your voice conversations.
One of the things that people like about Android is that it can load software from places other than a restricted, safe, controlled marketplace, but, that’s also one of the liabilities.  Apparently, the malware takes advantage of that ability to load itself onto your phone’s SIM chip and force the phone to record conversations to the chip then, optionally, upload those recordings to a server, presumably controlled by an attacker.  It’s somewhat unclear how that process would be initiated, but the simple fact that it can do it at all is chilling to me.  Also unclear from the articles was whether or not this has been spotted in the wild.
Hopefully, not yet.

So, here’s another warning for you.  Your devices, of any kind, are not safe.  Not ever.  If you have them powered on and they can connect to a network, even if you think they aren’t, you may still be vulnerable.  The Internet, in all its forms, is a wild and wooly and dangerous place.
Be careful out there, people.


Powered by WordPress
Any links to sites selling any reviewed item, including but not limited to Amazon, may be affiliate links which will pay me some tiny bit of money if used to purchase the item, but this site does no paid reviews and all opinions are my own.