Technology

Technology

IT Security Standards ISO/IEC 27002

Assembling a security policy can be a difficult task without guidance. The International Organization for Standardization (ISO) published a security standard called ISO/IEC 27002. This document refers to information technology related security issues and outlines a code of practice for IT security management. ISO/IEC 27002 provides a guideline for developing organizational security standards and security management practices.

The ISO 27002 document consists of 12 sections:
  1. Risk assessment
  2. Security policy - management direction
  3. Organization of information security - governance of information security
  4. Asset management - inventory and classification of information assets
  5. Human resources security - security aspects for employees joining, moving and leaving an organization
  6. Physical and environmental security - protection of the computer facilities
  7. Communications and operations management - management of technical security controls in systems and networks
  8. Access control - restriction of access rights to networks, systems, applications, functions and data
  9. Information systems acquisition, development and maintenance - building security into applications
  10. Information security incident management - anticipating and responding appropriately to information security breaches
  11. Business continuity management - protecting, maintaining and recovering business-critical processes and systems
  12. Compliance - ensuring conformance with information security policies, standards, laws and regulations

Within each section, information security controls and their objectives are specified and outlined. The information security controls are regarded as a best practice means of achieving those objectives. For each of the controls, implementation guidance is provided. Specific controls are not mandated since:

  1. Each organization is expected to undertake a structured information security risk assessment to determine its requirements before selecting controls that are appropriate to its specific circumstances. The introduction section outlines a risk assessment process although there are more specific standards covering this area such as ISO/IEC 27005.
  2. Industry-specific implementation guidelines for ISO/IEC 27002 are designed to advise organizations in the telecomms, financial services, healthcare and legal industries.
26 May 2009

European open source adoption - Forrester Report

See: tdwi.org
Promo
A recently released survey report on OSS adoption in large European companies tracks some very interesting trends. The Executive summary included this:

"In October 2008, Bull commissioned Forrester Consulting to evaluate the upcoming paradigm change of open source software enterprise adoption. In conducting in-depth interviews with 132 senior business and IT executives from large companies that are using open source products, Forrester found that these companies are embracing a fundamentally different understanding of software."
20 May 2009

e-Portfolio - Don McClintock

e-Portfolio for Don McClintock

CNT-2102 Switching & Wireless Fundamentals

Equipment 1 2912 or 2924 Switch (left), 1 2950 or 2960 Switch (right), 1Router with two FastEthernet interfaces and capable of trunking, 1 Cisco/Linksys Wireless Access Point, and 1 laptop with wireless capabilities. If available, and if time permits use a Cisco Wireless Card and its accompanying software.

RESULTS

Click on each link to review configs.

!
version 12.0
no service pad
service timestamps debug uptime
service timestamps log uptime
service password-encryption
!
hostname SW1
!
enable secret 5 $1$On7u$9XWjD3vAAdHqTINf7MqyU1
!
!
!
!
!
!
ip subnet-zero
no ip domain-lookup
!
!
!
interface FastEthernet0/1
description TO CISCO 1841 FA0/0
switchport trunk encapsulation dot1q
switchport trunk native vlan 99
switchport trunk allowed vlan 1,5,7,9,99,1002-1005
switchport mode trunk
!
interface FastEthernet0/2
shutdown
!
interface FastEthernet0/3
shutdown
!
interface FastEthernet0/4
shutdown
!
interface FastEthernet0/5
description PC1
switchport access vlan 5
!
interface FastEthernet0/6
description PC2
switchport access vlan 5
!
interface FastEthernet0/7
description PC3
switchport access vlan 7
!
interface FastEthernet0/8
shutdown
!
interface FastEthernet0/9
shutdown
!
interface FastEthernet0/10
shutdown
!
interface FastEthernet0/11
shutdown
!
interface FastEthernet0/12
description TRUNK to SW2
switchport trunk encapsulation dot1q
switchport trunk native vlan 99
switchport mode trunk
!
interface VLAN1
no ip directed-broadcast
no ip route-cache
shutdown
!
interface VLAN99
ip address 192.168.1.2 255.255.255.0
no ip directed-broadcast
no ip route-cache
!
ip default-gateway 192.168.1.1
banner motd  NO UNAUTHORIZED ACCESS ! 
!
line con 0
password 7 0822455D0A16
logging synchronous
login
transport input none
stopbits 1
line vty 0 4
password 7 0822455D0A16
logging synchronous
login
line vty 5 15
password 7 0822455D0A16
logging synchronous
login
!
end

  1. SW1 Config
  2. SW2 Config
  3. R1 Config
  4. R1:IP-Routes

WIRELESS ROUTER Images

Screenshots from the Wireless Router follow:
  • Screenshot 1
  • Screenshot 2
  • Screenshot 3
  • Screenshot 4
  • Click here for the Network Diagram

    In addition to the diagram do the following.

    1. Configure the Management vlan to be anything other than vlan 1.
    2. Configure Spanning-tree portfast wherever advisable.
    3. Configure SW1 so you can remotely access it via SSH, and only SSH (remotely) to it. Be sure the switch has the IOS to do SSH.
    4. Configure SW2 so you can remotely access it via telnet.
    5. Be sure your VTP is secure.
    6. Enable VTP “pruning.”
    7. Be sure to name vlan5, vlan 7, and vlan9.
    8. Implement port/switch security. Include the following: 1) maximum number of MAC addresses per port, 2) static mapping of MAC to port number, 3) shutting down unused ports, 4) action taken when there is a port security breach, etc…
    9. Although in a production network the wireless part of your network would/should take much stronger security measures, all you need to do for this exercise is to:
      1. assign an SSID
      2. a 104/128 bit WEP key
      3. disable SSID broadcasting (beaconing)
      4. enable MAC filtering

    When you are done and everything can ping, save the following output from the appropriate devices.

    1. show ip route
    2. show running-config
    3. show vlan brief
    4. show vtp status
    5. if necessary, screen shots from the AP (WRT300N).
    6. screen shots from PC connected wirelessly and pings to all locations
    7. whatever other commands you think appropriate.

    25 Apr 2009

    Site upgrade - Drupal Version 6 !

    I have just today upgraded the site to version 6 ! This is a very significant upgrade, and some care was needed to avoid issues as I moved forward... But the benefits are many, and I now look forward to playing with the theming modules (for developers) and so on... Don
    12 Apr 2009

    The Best E-Mail Program Ever

    How Gmail destroyed Outlook.

    By Farhad Manjoo

    As of this week, Gmail has reached perfection: You no longer have to be online to read or write messages. Desktop programs like Microsoft Outlook have always been able to access your old mail. There is a certain bliss to this; if you've got a pile of letters that demand well-composed, delicate responses (say you're explaining to your boss why you ordered that $85,000 rug), unplugging the Internet can be the fastest way to get things done. That's why offline access is a killer feature—it destroys your last remaining reason for suffering through a desktop e-mail program.

    Google's not alone in providing this option. Microsoft's Windows Live Mail, Yahoo's Zimbra, and the mail app made by the Web startup Zoho, among other services, also provide some measure of untethered e-mail access. For now, Google calls this addition "experimental"—you've got to turn it on explicitly, and the company is asking users to report any bugs—but I found it easy to set up and a delight to use.

    To get offline access, you first need to download and install a small program called Google Gears (except if you're using Google's Chrome browser, which comes with Gears built in). Then, after you enable Gmail's offline capability, the system will download two months of your most recent messages, which should take 30 minutes to an hour. Now you're good to go: When you're offline, type www.gmail.com into your browser, log in—yes, Gears enables you to log in even when you don't have a Web connection—and there's your e-mail. Though I work from home and rarely find myself away from a hot Wi-Fi connection, I shut off my router and parked myself on my couch for about an hour yesterday. I loaded up Gmail on my laptop, and it responded seamlessly—I could read, search through, and respond to any message I'd received during the last two months, all through the familiar Web interface. Eureka! I'll never again be mailless on a plane, a subway, or anyplace else where you don't have the Web but do have a lot of time to kill.

    Now that Gmail has bested the Outlooks of the world, it's a good time to assess the state of desktop software. There are some things that work better on your computer (your music app, your photo editor, your spreadsheets), and there are some that work better online (everything else). Over the last few years, we've seen many programs shifting from the first category to the second—now you can get spreadsheets and photo editors online, though they're still not as good as programs hosted on your computer. But e-mail has crossed the line completely. Hosted services like Gmail are now the most powerful and convenient way to grapple with a daily onslaught of mail. If you're still tied to a desktop app—whether Outlook, the Mac's Mail program, or anything else that sees your local hard drive, rather than a Web server, as its brain—then you're doing it wrong.

    The shift has been a long time coming. On July 4, 1996, Sabeer Bhatia and Jack Smith, two techies who met while working at Apple, launched Hotmail, the first free e-mail service on the Web. The date wasn't accidental—from the beginning, Web-based e-mail sought to liberate people from the strictures imposed by traditional providers (ISPs, universities, and employers, all of whom required some official affiliation before they gave you an e-mail address). Hotmail would give an inbox to anyone—you could even sign up for multiple addresses—and pretty soon it was impossible to find a soul who didn't e-mail.

    But it was a terrible hassle to actually use Hotmail—which Microsoft purchased in 1997—or the rival e-mail systems built by Yahoo, AOL, and the various other Web portals that dominated the last tech boom. Back then, Web-based e-mail was a great idea executed poorly. Internet connections, Web browsers, and Web-design technologies were slow and flaky; you waited an eternity to load up a message, you could easily lose a draft of a long e-mail if something went amiss with your modem, and you had a limited amount of storage space. Web e-mail was a redoubt of amateurs. If you were serious about your inbox, you kept it on your desktop.

    Desktop e-mail presented its own challenges, though. People who were serious about e-mail tended to archive all their messages. But desktop e-mail apps performed poorly when overloaded with mail; Outlook, for instance, crawled to halt if you stuffed it with just a few tens of thousands of messages, which for some people is only a few months' worth. What's more, keeping all your mail in one place was both annoying and not very safe. You couldn't easily check your messages on multiple computers. And what if you wanted to switch to a new computer? Or what if a power surge crashed your drive? As a journalist working during the Internet bust, my particular worry was getting a pink slip. If my boss suddenly asked me to turn in my company-provided laptop, all my e-mail—both professional and personal correspondence going back years—would be gone.

    By the time Gmail launched in summer 2004, I was desperate for an alternative to Outlook. (I had tried pretty much every other desktop e-mail app.) From the moment I logged on, I found it liberating. Gmail's interface was quick and intuitive, unlike any other major online service at the time. (Gmail did borrow some design ideas from Oddpost, an ahead-of-its-time Web e-mail app developed in 2002; Yahoo bought Oddpost in 2004.) Gmail was the first to display multiple messages on the same subject as threaded conversations—a design idea that user-interface experts had long been saying would make e-mail easier to use. Switching to Gmail also freed me from worrying about how I preserved my mail—Google, whose servers are much more secure than my own computer, was taking care of backups for me.

    What separates Gmail from its rivals is a basic design philosophy: It's built for power e-mailers. Late last year I visited the Gmail team at Google's Mountain View, Calif., headquarters. Keith Coleman, Gmail's program manager, told me that from the beginning, Google aimed to build something suitable for people who got a ton of mail—because in the future, everyone will get a ton of mail. Gmail's main features are all catnip for folks who find themselves buried under the weight of their inbox. There's a search engine worthy of the Google name, a slate of keyboard shortcuts that make organizing your messages brutally efficient, and a crowdsourced spam detector that keeps out unwanted messages. Best of all, Gmail is fast—you can switch between messages and folders quicker than you can in any other e-mail program, even desktop-based systems. Coleman told me that the team is constantly measuring and tweaking the responsiveness of its interface. (The software gives coders a readout of how long, on average, various tasks take to complete.) The Gmail managers are also gaga over user-interface tests: Before instituting any major feature, developers bring users into a whiz-bang lab outfitted with cameras and eye-tracking software to see how people react to the new stuff.

    Lately Coleman and his staff have been improving Gmail at a breakneck pace. They added a way to let people chat by voice and video, and they put out "themes" that personalize the appearance of your e-mail screen. Last summer, they launched Gmail Labs, a repository of add-on programs that run alongside Gmail. Offline access is one of these many Labs features; you can also add a to-do list, buttons to send people quick canned responses, a mini-program for sending text messages to cell phones, and a "gadget" for monitoring your Google Calendar and Google Docs from your e-mail. All these add-ons were created by Google programmers, but Coleman says that Gmail is also experimenting with letting outside developers add stuff. Google seems to be trying to create more than just a great e-mail program; with all these add-ons, Gmail is becoming a sort of e-mail platform whose users benefit from the best ideas in mail management.

    And that gets to what's so exciting about being a Gmail user right now. The app keeps getting better. You might say that's true of desktop systems, too; Outlook is not as clunky as it was five years ago, and, no doubt, it'll be better five years from now. But so will Gmail—and because it's online, you'll get those improvements faster, and without having to install any software. Now that you can use Gmail anywhere—even when you're beyond the reach of broadband—there's no longer any reason to suffer.

    Farhad Manjoo is Slate's technology columnist and the author of True Enough: Learning To Live in a Post-Fact Society. You can e-mail him at farhad.manjoo@slate.com.

    Article URL: http://www.slate.com/id/2210090/


    09 Feb 2009

    Google Desktop Search - TIPS

    Thanks to: http://www.techlifeweb.com/google/desktop_tips.html
    FAQ
    • Read Google's Frequently Asked Questions (FAQ) here.
    Release Notes
    • To find out what version of GDS you have go to the GDS home page and click the 'About' link at the bottom of the page.
    • Information about each version is available here.
    Google's Privacy Policy
    • Read Google's Privacy policy here.
    Getting Started Guide
    • Lots of tips to what GDS is all about and how to do searches of your computer are here.
    Help!
    • Google's GDS support page is here.
    Make GDS Better!
    • To make a suggestion, report a problem, get help or for general feedback go here.
    Other Helpful Web Sites On with the tips... In the current release it will index files from these applications:
    • Email
    • Gmail
    • Outlook 2000+
    • Outlook Express 5+
    • Netscape Mail 7.1+
    • Mozilla Mail 1.4+
    • Thunderbird
    • Files
    • text
    • Word
    • Excel
    • Powerpoint
    • PDF
    • MP3
    • image
    • audio
    • video
    • Web Browser History
    • Internet Explorer 5+
    • Netscape 7.1+
    • Mozilla 1.4+
    • Firefox
    • Chats
    • AOL 7+
    • AOL Instant Messenger 5+
    • MSN Messenger
    If you share your computer (one log in shared with others), be aware that the other users may stumble across information that you would rather not have them find.
    If users use separate Windows accounts you can install Google Desktop on each account. One user will not be able to access another user's Desktop index.
    Some preferences you should set
    • To change your preferences, right click on the GDS icon in your task tray and then click 'Preferences'
    • Deselect "Include secure pages (HTTPS) in web history" HTTPS are secured web pages. If you want to keep things like your online bank info private, don't index these kinds of pages.
    • While in the preferences, add the following sites to your list of sites NOT to index
    • http://127.0.0.1:4664/
    • http://127.0.0.1/
    • 127.0.0.1 is the location that GDS returns your local results to. Preventing indexing on this location will keep you from having results returned in a circlular fashion. That is, if you look something up and it returns 1 hit your result page then gets indexed and you'll have 2 hits the next time and on and on in a circular fashion. I don't know about IE but this is a problem with Slogger. If you use Slogger, you can also use it's settings to prevent this kind of logging as well. That may be preferable.
    • Any folder you do not want indexed should be entered here as well (eg. c:\My Stuff)
    • Google Integration
    • Some people freak out when they see local results appear when they do a search on the web. This is easily fixed by deselecting "Show Desktop Search results on Google Web Search result pages"
    • You may also want to increase the number of results you want to see per page. Simply change the number in the Number of Results section near the bottom of the Preferences page.

    Make sure your GDS is up to date
    • Right click on the GDS icon in your task tray and then click 'About'. This will show you what version you have loaded.

    Move index file to a different drive
    Some people don't want the index taking up lots of space on their main drive. Once again a registry hacking expedition is avoided by the wonderful TweakGDS. Seriously, get this tool. You'll use it sooner or later.
    • FYI, by default the index is stored in:
      C:\Documents and Settings\USERNAME\Local Settings\Application Data\Google\Google Desktop Search
      where USERNAME is your username on the computer.

    Files on Mapped Network Drives
    In the previous versions this was a lengthy process that involved hacking around in your registry. Thankfully, this is now part of the preferences. Simply go to the preference page and look for the section called "Search These Locations". Click the "Add drive or folder to search" link and you will be able to navigate to one of your mapped drives. After you select a drive and save your preferences it will appear in your list as \\servername\share\path

    The really cool part of this, if you have a laptop, is you have the Google cache local on your computer. So if you need some info from a file you accessed on the network at an earlier point, you may be able to get that info from your cache.
    Large Text files
    There currently seems to be a limitation as to the size of the file that GDS will index. According to this page at Google's support, the limit is 10,000 words. And sometimes less to save space.

    What GDS Does Not Index
    When you do an install of GDS with out any plugins or other modifications, the following file types are not indexed:
    • .tmp, .temp, .pst, .dat, .pf, .obj
    Along with the following directories:
    • Recycler, System Volume Information, AppData, Cache, Cookies, History, Local AppData, Local Settings, PrintHood, Recent, SendTo, Startup, Templates
    • Your system root folder. In most cases, this is C:\Windows\ or C:\winnt
    Deskbars
    • GDS now has in integrated deskbar. The desk bar can be part of your windows task bar or it can float around your screen. More details can be found here.
    Sidebar
    • GDS now comes with a sidebar that runs up the side of your screen and provides all kinds of information at a glance. Personally, I haven't really found that I like this thing all that much. I don't like wasting screen real estate.
    • You can find more information about the side bar here.
    Finding a File by Part of the Name
    Let's say you want to find file called "U2-All That You Can't Leave Behind-Beautiful day.mp3"
    In your search field type (no quotes) "Beautiful filetype:mp3"
    Your results will come back: U2-All That You Can't Leave Behind-Beautiful day.mp3
    Also, when you get your results back, clicking "Sort by Relevance" helps out quite a bit as well.

    Password Protected Word File
    GDS will index password protected word files. There is now a preference to turn this on and off. If you have it on (meaning you have the preference checked) then if you create a word file and put in a password and save it, GDS will index it and the file will be viewable via that Google Cache by anyone who uses your computer. You need to weigh the security risk for yourself.
    • Again, Google Desktop Search was meant for a single user PC. You created the file and it's password. You should know what it contains.
    • Another thing you can do for added security is create a "Do Not Index" folder and add it to Google's Preferences like I mentioned above.

    What to do if you have installed Firefox or Thunderbird after GDS
    • If you install Mozilla Firefox, Mozilla, and/or Thunderbird after you install Google Desktop Search, Desktop Search may not be able to find your web history or email. Google has instructions for fixing this here.
    How to force a clean re-index without reinstalling
    If you have been to this site before you may remember this section contained several steps that involved hacking around in your Windows registry. Thankfully, there is a new utility that is available to make this much, much easier. The tool is called TweakGDS. Among other things, you can use TweakGDS to force a complete reindexing of your conputer. Download it today!

    Note: Even though there is now a nice tool to make it easier, it still involves modifying you registry so proceed with caution and read the instructions carefully.

    How to manually uninstall Google Desktop Search
    You can easily uninstall Google Desktop Search by going to Start > Programs > Google Desktop Search > Uninstall Google Desktop Search. If that didn't work, you may need to manually uninstall the program. Here is how:
    TO EDIT THE WINDOWS SYSTEM REGISTRY:
    As you may know, editing the Windows registry is a fairly advanced process. If you're not comfortable doing it yourself, you may want to contact your system administrator. That said, you should be able to solve the problem by deleting the following registry keys:

    HKEY_LOCAL_MACHINE\SOFTWARE\Google\Desktop
    HKEY_CURRENT_USER\SOFTWARE\Google\Google Desktop

    You'll need to restart your machine in order for this change to take
    effect. Once you've done this, you can remove the program files for
    Desktop Search. Here's how:

    TO REMOVE GOOGLE DESKTOP SEARCH:
    Open C:\Documents and Settings\USERNAME-THAT-NO-LONGER-EXISTS\Local
    Settings\Application Data\Google\Google Desktop Search. Delete all the
    files in this directory.

    You should now be able to successfully install and use Google Desktop
    Search.

    Make GDS one of Firefox's search engines
    • If you use Firefox, you'll want this plugin to allow you to add GDS as one of the search engines.
    24 Jan 2009

    SSL compromised...

    From: http://www.win.tue.nl/hashclash/rogue-ca/#sec71 In a statement made public on December 30th, the following researchers: Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger said: "We have identified a vulnerability in the Internet Public Key Infrastructure (PKI) used to issue digital certificates for secure websites. As a proof of concept we executed a practical attack scenario and successfully created a rogue Certification Authority (CA) certificate trusted by all common web browsers. This certificate allows us to impersonate any website on the Internet, including banking and e-commerce sites secured using the HTTPS protocol." In response, Verisign had this to say: "We applaud security research of this sort and are glad that white hats like the "MD5 Collision Inc." group make a point of investigating online security."
    "We have discontinued using MD5 when we issue RapidSSL certificates, and we've confirmed that all other SSL Certificates we sell are not vulnerable to this attack. We'll continue on our path to discontinue MD5 in all end entity certificates by the end of January, 2009."
    "... any customer who would like to do so can replace any MD5-hashed certificate free of charge."
    06 Jan 2009

    New PROMO Piece

    Promo
    Here's the new promo piece we are mailing out this month. (Click for a more detailed view)

    Highlighting the following services:

    • Are you confused, upset or discouraged with your computer systems ?
    • Need to transition to an EMR1 but afraid it will be difficult or complicated?
    • Some days, do you just HATE computers?
    • Afraid of losing your data?

    1[EMR] Electronic Medical Records System

    We specialize in making technology WORK for YOU, rather than against you. We have 20+ years of computer expertise, and we specialize in helping medical and legal practices in Jacksonville.

    I‘ll come to your office to meet with you — no charge, and no obligation.

    I will show you how you can improve efficiency and save money!

    25 Dec 2008

    Bright Ideas

    Ramon Ray: Tech Basics

    6 Technology Rules to Thrive

    This year, consider implementing these rules that can give your business a boost.

    Over the past few weeks, I've been thinking about the following six rules I created that I believe will really help you boost your business. There are plenty of other technology rules to keep in mind, but these six go beyond the traditional guidelines of having a website and making sure your technology is secure.

    1.Spend money on technology as an investment--not as a cost.
    You spend money on insurance. You probably have a lawyer and an accountant. However, when it comes to spending money on technology, many of you only do so when absolutely necessary. You don't spend money on technology that you think you don't need. This is a mistake.

    If you're building a business that's meant to last, you must think of your technology spending as an investment in how technology can help your business grow. You should spend money on technology that will help you now and in the future. The right investments in technology will help you save money and time, do more with less and grow your business.

    Don't think of where your business is now, but think of where your business will be in five years and invest in technology accordingly.

    2. Microsoft Outlook is not CRM.
    Many of you, like me, use Microsoft Outlook as the core foundation of your business. You use it to manage your e-mail, tasks, notes and calendar--and that's good. But if you want to increase sales to your current customers and know everything you can about each customer, you should use a true CRM product or service.

    When a customer buys from you, chats with your sales rep and maybe returns a product, a true CRM product or service can help you mine this data and use it to know more about your customers.

    3. Web 2.0 is no joke.
    You've heard about Facebook, MySpace, LinkedIn and a few dozen other social media tools that help you connect with others. Many websites also enable you to comment, upload your own videos and share your insights. This is what Web 2.0 is about. It's more than you giving a sales pitch to someone, which is a one-way conversation. It's about having a conversation with customers and letting them have a conversation with each other--about you.

    You need to have a great website with quality navigation and content. You need an e-mail newsletter to reach people. You should have a blog to foster more conversation and boost your websites rankings in search engines.

    The next step is to ensure visitors to your site can communicate with you and with each other using Web 2.0 technologies.

    4. Mobile technology can boost productivity.
    If you and your staff are sitting at desks all day, you may not need mobile technology. But if you travel, you need to implement mobile technology solutions. This means you can access your office--e-mail, faxes, files and more--wherever you are.

    There's no reason to tell a customer they have to wait until you get back to your office. There's no excuse for telling a partner you haven't received a fax someone sent you or missed a voice mail because you weren't in the office.

    5. Outsource your technology.
    You don't need to manage and implement technology on your own. You may be an expert in what you sell, but you probably aren't an expert in network security, data backup or mobile technology. The only way you're going to maximize technology is to outsource your use and implementation of it.

    Technology isn't all that you need to outsource. If you find that you're scanning business cards, answering phones and faxing proposals, you need to hire someone to do these tasks for you. Whether you're a one- or 50-person business, you need to manage your company and concentrate on its growth. Hire someone else, such as a smart virtual or in-person assistant to help you.

    6. Don't "technologize" a bad business process.
    I'm sure you run a very good business and do your best to manage its various processes, however if some aspects aren't running as well and you think technology is the sole answer, you're wrong.  

    I was recently in Puerto Rico at the great Ritz Carlton Hotel. The entire experience was simply splendid. What most impressed me was the hotel's customer service, which is a huge part of the Ritz's culture. However, they also use technology to profile each guest and build a database of their likes and dislikes. What if the Ritz Carlton had employees that were rude, inconsiderate and nasty? The hotel would only be "technologizing" a bad business process.

    They hire employees who love service and then use technology to manage and enhance the customer service experience.

    Ramon Ray is Entrepreneur.com's  "Tech Basics" columnist and editor of Smallbiztechnology.com. He's the author of Technology Solutions for Growing Businesses and currently serves on the board of directors and the technology committee for the Manhattan Chamber of Commerce.

    01 Dec 2008

    SSH for Windows 200x Servers

    http://pigtail.net/LRP/printsrv/cygwin-sshd.html See the above URL for this detailed description on how to install/use SSH for these O/Ses. According to some cygwin gods, the only official document that you should use is /usr/share/doc/Cygwin/openssh.README which is probably valid, but it seems to aim at users with a fair bit of Linux/Unix knowledge. The purpose of this tutorial is for Windows users who are perhaps less familiar with Unix commands wanting to try out the famous Open Source ssh server (openSSH) on a desktop Windows XP (Windows Vista is relatively new, so information presented here is beta only).
    12 Nov 2008
    Subscribe to Technology