<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security &#8211; David&#039;s Church Information Technology</title>
	<atom:link href="/category/security/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>David Szpunar: Owner, Servant 42 and Servant Voice</description>
	<lastBuildDate>Sun, 01 Jun 2008 03:23:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.2</generator>
	<item>
		<title>Using Free Wireless and VPNs</title>
		<link>/2008/05/31/free-wireless-wifi-vpn-security/</link>
					<comments>/2008/05/31/free-wireless-wifi-vpn-security/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Sun, 01 Jun 2008 03:23:22 +0000</pubDate>
				<category><![CDATA[Companies]]></category>
		<category><![CDATA[Cool Services]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[People]]></category>
		<category><![CDATA[Remote Access]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Wireless]]></category>
		<category><![CDATA[public wireless]]></category>
		<category><![CDATA[Tony Dye]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=251</guid>

					<description><![CDATA[I read Tony Dye&#8217;s post on Wireless Safety: The VPN Question and wanted to share a comment. It turned into a post of its own, so I&#8217;ve moved it into one :-) Read his post first so this makes sense. If a laptop user establishes a VPN connection to your corporate VPN server, and doesn&#8217;t [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>I read <a title="Tony Dye's blog" href="http://tonydye.typepad.com/">Tony Dye&#8217;s</a> post on <a title="Wireless Safety: the VPN Question" href="http://tonydye.typepad.com/main/2008/05/wireless-safe-1.html">Wireless Safety: The <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> Question</a> and wanted to share a comment. It turned into a post of its own, so I&#8217;ve moved it into one :-) Read his post first so this makes sense.</p>
<p>If a laptop user establishes a <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connection to your corporate <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> server, and doesn&#8217;t use split tunneling (in other words, from the time they&#8217;re connected, all traffic goes through the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> as its default gateway no matter what), assuming that you&#8217;re using a <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> client that verifies the identity of the server (rather than blindly trusting DNS, which is easily spoofable on a wireless network), the user moves from the realm of insecurity into a much more secure environment, similar to being plugged into your wired network at the office. Of course, then your office WAN connection has to support <em>everything</em> they do, including web browsing!</p>
<p>However, using a free or paid &#8220;<span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span>&#8221; service from a company that just turns your wireless connection into a <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span>-enabled &#8220;wired&#8221; connection is only going to help thwart unencrypted wifi sniffing and other such attacks. Unless you also use <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span> and other encryption technologies, those services are just giving you a wired internet connection just like your home connection rather than the easier-to-sniff unencrypted wireless. It&#8217;s better than nothing, but it&#8217;s not like an encrypted pipe into your own network.</p>
<p>Don&#8217;t discount unencrypted wireless attacks. It&#8217;s never happened to me, but if you hop over and read some of <a title="Chief Security Monkey: Case Files Index" href="http://blogs.ittoolbox.com/security/investigator/archives/official-securitymonkey-case-file-index-14787">Security Monkey&#8217;s case files</a> at you&#8217;ll discover that there&#8217;s a lot of bad stuff going on in the world on computers :-) Those case files are slightly modified true stories from this guy&#8217;s career! His old 2005-2007 podcast episodes are worth listening to for some cool security tips and tools as well, to digress for a moment!</p>
<p>I don&#8217;t have a good answer; <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connections to the office make internet run very slowly unless you have the WAN bandwidth to support fast throughput to and from all your remote users including web browsing! But that&#8217;s a much more secure way to operate. The number of ways wireless can be hijacked, sniffed, spoofed, and hacked, especially if it&#8217;s unencrypted to begin with, is downright scary! At the very least use <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span> with verified certificates for anything you do of any importance (or if passwords are transmitted) on an encrypted wireless connection. As an IT guy, I can tell you (or myself) whether a particular session (POP3, IMAP, <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Remote Procedure Call' );"><acronym class="uttInitialism">RPC</acronym></span> over <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'HyperText Transfer Protocol' );"><acronym class="uttInitialism">HTTP</acronym></span>, <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'HTTP protocol using SSL encryption','caption', 'HyperText Transfer Protocol Secure' );"><acronym class="uttInitialism">HTTPS</acronym></span>, etc.) is happening over an encrypted connection or not and can be careful. However, the average user is, obviously, not going to know or even care necessarily if Outlook is using POP3 unencrypted or via <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span>, or using <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Remote Procedure Call' );"><acronym class="uttInitialism">RPC</acronym></span> over <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'HTTP protocol using SSL encryption','caption', 'HyperText Transfer Protocol Secure' );"><acronym class="uttInitialism">HTTPS</acronym></span> securely. And if they log into Gmail, they&#8217;re not likely to know that although their password is always encrypted on login, their email is transmitted in the clear unless they initiate the session using <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span> from the start (using https://mail.google.com/ rather than http://mail.google.com)./ Even if their email contains passwords and confirmations for other accounts!</p>
<p>Stuart mentioned <a title="WiTopia homepage" href="http://www.witopia.net/">WiTopia</a> on <a title="Stuart's comment on Tony Dye's post" href="http://tonydye.typepad.com/main/2008/05/wireless-safety.html#comment-115001000">his comment</a> to <a title="Tony Dye: Wireless Safety Basics" href="http://tonydye.typepad.com/main/2008/05/wireless-safety.html">Tony&#8217;s original post</a>. I&#8217;d never heard of them before, but I&#8217;ve seen similar services to their personalVPN product. That service appears to be, like I mentioned above, just a way to get a &#8220;wired quality&#8221; connection to the internet over unsecured wireless. An admirable service and a worthy goal even with its limitations, but what caught my eye even more was their <a title="WiTopia's SecureMyWiFi Service" href="http://www.witopia.net/securemore.html">SecureMyWifi</a> service. It&#8217;s still a wireless service but it has to do with your own on-campus wireless access. It lets you move away from using <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'A standard used to encrypt and authenticate wireless network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&quot;&gt;link&lt;/a&gt;)','caption', 'Wi-Fi Protected Access' );"><acronym class="uttAbbreviation">WPA</acronym></span> with a Pre-Shared Key (<span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'WPA-PSK, also known as WPA Personal, this wireless network security setting uses a single key shared among clients and base station for authentication and encryption of network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/WPA-PSK&quot;&gt;link&lt;/a&gt;)','caption', 'Pre-Shared Key' );"><acronym class="uttAbbreviation">PSK</acronym></span>), also known as <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'A standard used to encrypt and authenticate wireless network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&quot;&gt;link&lt;/a&gt;)','caption', 'Wi-Fi Protected Access' );"><acronym class="uttAbbreviation">WPA</acronym></span>-Personal, and use their <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'A server used for authenticating users against a central server. Can be used for dial-in users, VPN, wireless (802.1x) and other uses. (&lt;a href=&quot;http://en.wikipedia.org/wiki/RADIUS&quot;&gt;link&lt;/a&gt;)','caption', ' 	Remote Access Dial-In User Server' );"><acronym class="uttInitialism">RADIUS</acronym></span> services to authenticate users individually to your encrypted wireless access points. It seems a bit pricey (to me&#8211;it&#8217;s currently a $99 setup fee, $99/year for one access point, and $14.95/year for each additional access point), but we have the same thing set up using Microsoft&#8217;s free (built-in on Windows Server 2003) <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Microsoft\'s RADIUS server, which comes included as a part of Windows Server. (&lt;a href=&quot;http://www.microsoft.com/technet/network/ias/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', ' 	Internet Authentication Service' );"><acronym class="uttInitialism">IAS</acronym></span> <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'A server used for authenticating users against a central server. Can be used for dial-in users, VPN, wireless (802.1x) and other uses. (&lt;a href=&quot;http://en.wikipedia.org/wiki/RADIUS&quot;&gt;link&lt;/a&gt;)','caption', ' 	Remote Access Dial-In User Server' );"><acronym class="uttInitialism">RADIUS</acronym></span> server in-house. If you aren&#8217;t familiar with how to set it all up, the WiTopia service could be quite beneficial! They charge per access point, but at Lakeview we have a centrally-managed access points system with one controller that takes care of authentication. I assume that the WiTopia service is based on unique <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'A server used for authenticating users against a central server. Can be used for dial-in users, VPN, wireless (802.1x) and other uses. (&lt;a href=&quot;http://en.wikipedia.org/wiki/RADIUS&quot;&gt;link&lt;/a&gt;)','caption', ' 	Remote Access Dial-In User Server' );"><acronym class="uttInitialism">RADIUS</acronym></span> keys for each access point client; since the central controller (currently running 12 access points) acts as a single client, it should look like &#8220;one&#8221; access point to the service. Whether or not this is allowed with their terms of service I have no idea; we are not likely going to use the service since I already do this in-house for free, but I would recommend reading the terms and/or contacting them if you plan on doing something similar to remain in the spirit of their offering.</p>]]></content:encoded>
					
					<wfw:commentRss>/2008/05/31/free-wireless-wifi-vpn-security/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
		<item>
		<title>Security Breach by ID Theft Hits Close to Home</title>
		<link>/2008/04/18/security-by-id-theft-hits-close-to-home/</link>
					<comments>/2008/04/18/security-by-id-theft-hits-close-to-home/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Sat, 19 Apr 2008 02:25:01 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Breakin]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Indiana]]></category>
		<category><![CDATA[Indianapolis]]></category>
		<category><![CDATA[Security Breach]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=235</guid>

					<description><![CDATA[A server was stolen from a debt-collection agency in Indianapolis last month, which meant 700,000 names, addresses, phone numbers, and of course, social security numbers are out there. It&#8217;s supposedly the largest computer security breach in Indiana history. Given the fact that it&#8217;s a debt-collection agency that lost the records (which were supposedly &#8220;protected by [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>A server was stolen from a debt-collection agency in Indianapolis last month, which meant 700,000 names, addresses, phone numbers, and of course, social security numbers are out there. It&#8217;s supposedly the largest computer security breach in Indiana history. Given the fact that it&#8217;s a debt-collection agency that lost the records (which were supposedly &#8220;protected by two passwords, but was not encrypted&#8230;[and] had been stored behind three locked doors.&#8221;), if you live in Indiana but never had late bills go to collections, you shouldn&#8217;t be directly affected, although there&#8217;s a hotline you can call to verify. <a title="IndyStar.com: 700,000 Hoosier IDs exposed after theft" href="http://www.indystar.com/apps/pbcs.dll/article?AID=/20080418/NEWS/80418041">Original details and report</a> are available at the <a title="Indianapolis Star home page" href="http://www.indystar.com/">Indy Star</a>, at least for the time being (they tend to lock up articles after a certain amount of time and make you pay for them).</p>
<p>This is just one more step in the growth of identify theft, which is becoming more and more of a problem (I won&#8217;t bore you with the details of other theft cases, if you&#8217;re in the IT field I you probably know about them already!). I hope they figure out a better way to protect this stuff before it gets as common as spam as gotten. But I know the technical sophistication required by every single business to make that a reality, and I don&#8217;t think the problem is going away any time soon.</p>
<p>On the personal front, I&#8217;m in Ohio this weekend for my brother-in-law&#8217;s wedding, and I only have one week of schoolwork left for this semester before being freed to spend some more time blogging; I&#8217;m looking forward to getting back into the swing of things! I have managed to stick around the <a title="My post: Ministry Technologys First Class, Church IT Podcast, and IRCs #citrt" href="http://infotech.davidszpunar.com/2008/01/16/ministry-tech-church-it-podcast-irc-citrt/">#citrt Freenode IRC channel</a> on a consistent basis, and I&#8217;ve stayed reasonably <a title="Twitter DSZP" href="http://twitter.com/dszp">active on Twitter</a> since MinistryTECH and the Roundtable, which I&#8217;m still catching up from at work (but getting close to the normal level of &#8220;behind&#8221; :-)</p>]]></content:encoded>
					
					<wfw:commentRss>/2008/04/18/security-by-id-theft-hits-close-to-home/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Is SonicWALL the Answer?</title>
		<link>/2008/04/12/is-sonicwall-the-answer/</link>
					<comments>/2008/04/12/is-sonicwall-the-answer/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Sat, 12 Apr 2008 13:03:20 +0000</pubDate>
				<category><![CDATA[Companies]]></category>
		<category><![CDATA[Content Filtering]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CDP]]></category>
		<category><![CDATA[Mark Moreno]]></category>
		<category><![CDATA[SonicWALL]]></category>
		<category><![CDATA[UTM]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2008/04/12/is-sonicwall-the-answer/</guid>

					<description><![CDATA[MinistryTECH and the Church IT Roundtable gave me a lot of great opportunities to gain interest in and discuss SonicWALL solutions with Mark Moreno, consultant and reseller, and SonicWALL poster children Jason Lee and Jeremie Kilgore. I must admit to being more than a little impressed with the combination of flexibility, power, and price that [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a title="MinistryTECH Church IT Conference" href="http://www.ministrytech.org/">MinistryTECH</a> and the <a title="CITRT: Church IT Roundtable homepage" href="http://www.citrt.org/">Church IT Roundtable</a> gave me a lot of great opportunities to gain interest in and discuss <a title="SonicWALL homepage" href="http://www.sonicwall.com/">SonicWALL</a> solutions with <a title="Mark Moreno's blog, &quot;Christ's IT Guy&quot;" href="http://christsitguy.spaces.live.com/">Mark Moreno</a>, consultant and reseller, and SonicWALL poster children Jason Lee and Jeremie Kilgore. I must admit to being more than a little impressed with the combination of flexibility, power, and price that the SonicWALL products provide. Those are three pretty important areas. In specific my first interest is in the SonicWALL firewall (<a title="SonicWALL: NSA Series UTM Appliances" href="http://www.sonicwall.com/us/products/NSA_Series.html">NSA Series</a>) products that also do <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'UTM is the combination of many network defense technologies into a single product or appliance. (&lt;a href=&quot;http://en.wikipedia.org/wiki/Unified_Threat_Management&quot;&gt;link&lt;/a&gt;)','caption', 'Unified Threat Management' );"><acronym class="uttInitialism">UTM</acronym></span> including antivirus, antispyware, intrusion prevention and content filtering, my second interest is in their <a title="SonicWALL: Continuous Data Protection (CDP) Appliances" href="http://www.sonicwall.com/us/products/backup_and_recovery.html">Continuous Data Protection</a> (CDP) products as both on-site and off-site backup solutions, and thirdly I&#8217;m interested in the ability of the SonicWALL firewall appliance to also serve as a centralized control point for relatively inexpensive <a title="SonicWALL: SonicPoint and SonicPoint G Administrator's Guide" href="http://www.sonicwall.com/us/support/230_3709.html">SonicPoints</a> (wireless access points).</p>
<p>Before making a decision there are certainly things to evaluate, and I definitely want to get my hands on an NSA box for a while to test first. I like the <a title="Microsoft ISA Firewall" href="http://www.microsoft.com/isaserver/default.mspx"><span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> 2004</a> firewall interface that we&#8217;re currently running and I want to make sure I&#8217;m comfortable managing SonicWALL if we go that route.</p>]]></content:encoded>
					
					<wfw:commentRss>/2008/04/12/is-sonicwall-the-answer/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>New TrueCrypt 5.1 Does Hibernation, Kind Of</title>
		<link>/2008/03/11/new-truecrypt-51-does-hibernation-kind-of/</link>
					<comments>/2008/03/11/new-truecrypt-51-does-hibernation-kind-of/#respond</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Tue, 11 Mar 2008 16:02:57 +0000</pubDate>
				<category><![CDATA[Cool Tools]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[hard disk]]></category>
		<category><![CDATA[system encryption]]></category>
		<category><![CDATA[TrueCrypt]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=216</guid>

					<description><![CDATA[TrueCrypt just released version 5.1, adding support for hibernation (see prior post) to an encrypted system partition (thanks to Joel for letting me know). They&#8217;ve also increased AES encryption speed by 30-90% and a few other nice tweaks and fixes. I went ahead and upgraded last night and started encrypting my drive before I went [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>TrueCrypt just <a title="True Crypt Version History" href="http://www.truecrypt.org/docs/?s=version-history">released version 5.1</a>, adding support for hibernation (<a title="My post: TrueCrypt Whole-Disk Encryption: Why I Turned It Off" href="http://infotech.davidszpunar.com/2008/02/18/truecrypt-whole-disk-encryption-why-i-turned-it-off/">see prior post</a>) to an encrypted system partition (thanks to<a title="Joel's comment on my post: TrueCrypt Whole-Disk Encryption: Why I Turned It Off" href="http://infotech.davidszpunar.com/2008/02/18/truecrypt-whole-disk-encryption-why-i-turned-it-off/#comment-2419"> Joel</a> for letting me know). They&#8217;ve also increased AES encryption speed by 30-90% and a few other nice tweaks and fixes. I went ahead and upgraded last night and started encrypting my drive before I went to bed last night, which only took 2 hours on my 100GB hard drive if their estimate is to be believed! (I believe it; in 10 minutes it had encrypted 10% of the drive.) I was excited to try TrueCrypt again with hibernation support, because listening to Steve Gibson rave about it on <a title="Security Now 133: TrueCrypt 5.0 on Feb. 28, 2008" href="http://www.grc.com/sn/SN-133.htm">Security Now</a> gave me a bit more insight than I&#8217;d taken the time to read about before.</p>
<p>So far this morning, I&#8217;ve tried hibernating three or four times, and as promised, TrueCrypt does not block me from hibernating any more. However, my experience resuming from hibernation has been, well&#8230;non-existent! After appearing to hibernate normally, when I try to resume I am prompted for my decryption boot password and then Windows boots normally. From scratch. No traces of hibernation present.</p>
<p>My only thought as to why this is happening is perhaps it&#8217;s because I decided to use Whole Drive encryption this time, as opposed to System Partition encryption. I didn&#8217;t realize when I started the encryption process that the version history was so specific, but it does say that one of the new features is, &#8220;Support for hibernation on computers where the system partition is encrypted (previous versions of TrueCrypt prevented the system from hibernating when the system partition was encrypted).&#8221; It specifically mentions encryption of the system partition!</p>
<p>I started the decryption process (estimated to complete in 6 hours, much slower than encryption) this morning and when complete, I will attempt re-encrypting just the system partition and see if that fixes the issue. I&#8217;ll update this post with information as I discover it!</p>
<p><strong>UPDATE Saturday, March 15th, early morning:</strong> Yesterday, I re-encrypted just the system partition with TrueCrypt, but the same problem still occurs. I did discover (thanks to referrer logs) that someone had a similar problem and <a title="Registration required: HIbernation not working properly in 5.1 in my scenario (TrueCrypt Forums)" href="http://forums.truecrypt.org/viewtopic.php?p=43577#43577">posted a thread</a> to the official <a title="TrueCrypt Forums" href="http://forums.truecrypt.org/">TrueCrypt Forums</a>, linking to this post. Apparently, while the problem does not appear to be widespread, it does seem to still happen for others. I did not get a chance to try any of the suggested workarounds, but I did post an update to that thread with a few more details of my experience in case it helps resolve the issue. About a day after I posted my details, the <a title="Registration required: Beta test (main focus: hibernation) (TrueCrypt Forums)" href="http://forums.truecrypt.org/viewtopic.php?t=9994">developers posted a fix</a> in the form of <a title="TrueCrypt Beta Downloads" href="http://www.truecrypt.org/downloads-beta.php">5.1a Beta</a>, which they requested be tested to see if the problem is fixed. I have installed the beta, but it requires a reboot before taking effect. Update coming later.</p>
<p><strong>UPDATE later Saturday:</strong> The beta of 5.1a fixed the problem, and hibernation works now. Happy ending! Apparently there is still a problem with a couple of versions of Vista that are fixed but won&#8217;t be released in a beta, per <a title="Registration required: Beta information from Vertex (TrueCrypt forums)" href="http://forums.truecrypt.org/viewtopic.php?p=44130#44130">Vertex on the forums</a>:</p>
<blockquote><p><span class="postbody"> This is a known issue in Beta 1 that affects users running Windows<br />
Vista Ultimate and Enterprise. According to the developers, it was<br />
discovered and fixed shortly after Beta 1 was released. Beta 2 is<br />
currently unlikely to be released so if you use one of those systems,<br />
you will need to wait for TrueCrypt 5.1a final/stable.</span></p></blockquote>]]></content:encoded>
					
					<wfw:commentRss>/2008/03/11/new-truecrypt-51-does-hibernation-kind-of/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>TrueCrypt Whole-Disk Encryption: Why I Turned It Off</title>
		<link>/2008/02/18/truecrypt-whole-disk-encryption-why-i-turned-it-off/</link>
					<comments>/2008/02/18/truecrypt-whole-disk-encryption-why-i-turned-it-off/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Mon, 18 Feb 2008 17:28:53 +0000</pubDate>
				<category><![CDATA[Cool Tools]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Bitlocker]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[hard disk]]></category>
		<category><![CDATA[system encryption]]></category>
		<category><![CDATA[TrueCrypt]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2008/02/18/truecrypt-whole-disk-encryption-why-i-turned-it-off/</guid>

					<description><![CDATA[Last night, I decrypted my laptop. Eleven days ago, I posted about TrueCrypt&#8217;s new whole-disk encryption. I encrypted my laptop and started using it. Speed didn&#8217;t seem to be an issue (or much of one, maybe it was a little bit slower overall, but that&#8217;s just my perception). But it also disabled Hibernation, forcing me [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Last night, I decrypted my laptop. Eleven days ago, I posted about <a title="TrueCrypt 5: Whole Disk Encryption and OS X Support" href="http://infotech.davidszpunar.com/2008/02/07/truecrypt-5-whole-disk-encryption-and-os-x-support/">TrueCrypt&#8217;s new whole-disk encryption</a>. I encrypted my laptop and started using it. Speed didn&#8217;t seem to be an issue (or much of one, maybe it was a little bit slower overall, but that&#8217;s just my perception). But it also disabled Hibernation, forcing me to use Standby mode.</p>
<p>The main reason was the lack of hibernation support. I tried using standby, which seemed to work sometimes. I would verify that standby mode had been entered, and put the latpop in my bag. Less than 12 hours later, more often than not, the battery was dead and the laptop was off. Even within shorter time periods, I would sometimes take the laptop out of my bag and it would be running! This is dangerous, as carrying around a laptop when it&#8217;s off can be done much less gently than should be done when it&#8217;s on. And running in my bag prevents good heat dissipation, so it would be practically burning hot in this case (pun intended :-)</p>
<p>So, now hibernation works again. Which has worked well for me 99% of the time since I purchased the laptop. And it&#8217;s not encrypted, but it wasn&#8217;t in the past either. If they can make whole-disk encryption work with hibernation, and I&#8217;m not enthusiastic about the chances of this given the security implications that I think I understand but probably need to read more carefully, I&#8217;ll give it another try.</p>
<p>Note: I&#8217;m running Windows XP Pro on my laptop. At some point I may try Vista Ultimate, and may perhaps test Vista&#8217;s Bitlocker. I&#8217;ve heard it&#8217;s more complicated. I don&#8217;t know if it allows for hibernation or not. There&#8217;s an excellent <a title="4sysops: System drive encryption: TrueCrypt 5 vs. Bitlocker" href="http://4sysops.com/archives/system-drive-encryption-truecrypt-5-vs-bitlocker/">overview of the two together</a> at <a title="4sysops: For Windows Administrators (homepage)" href="http://www.4sysops.com/">4sysops</a>, a blog I highly recommend overall.</p>
<p><strong>UPDATE on March 15th:</strong> The problem with hibernation support has been <a title="My post: New TrueCrypt 5.1 Does Hibernation, Kind Of" href="http://infotech.davidszpunar.com/2008/03/11/new-truecrypt-51-does-hibernation-kind-of/">fixed in TrueCrypt&#8217;s beta and soon the final release of version 5.1a</a>. I am back to running an encrypted system for now!</p>]]></content:encoded>
					
					<wfw:commentRss>/2008/02/18/truecrypt-whole-disk-encryption-why-i-turned-it-off/feed/</wfw:commentRss>
			<slash:comments>19</slash:comments>
		
		
			</item>
		<item>
		<title>TrueCrypt 5: Whole Disk Encryption and OS X Support (updated)</title>
		<link>/2008/02/07/truecrypt-5-whole-disk-encryption-and-os-x-support/</link>
					<comments>/2008/02/07/truecrypt-5-whole-disk-encryption-and-os-x-support/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Thu, 07 Feb 2008 06:33:56 +0000</pubDate>
				<category><![CDATA[Cool Tools]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[hard disk]]></category>
		<category><![CDATA[system encryption]]></category>
		<category><![CDATA[TrueCrypt]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2008/02/07/truecrypt-5-whole-disk-encryption-and-os-x-support/</guid>

					<description><![CDATA[Version 5.0 of the TrueCrypt encryption software was released on Feb. 5th. I ran into this news on Hackzine where they mentioned Mac OS X support as a new TrueCrypt feature. That&#8217;s cool, but I don&#8217;t use Mac, so what? I&#8217;ll upgrade soon, since I&#8217;ve been using TrueCrypt for over a year and love it, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a title="TrueCrypt homepage" href="http://www.truecrypt.org/"><img decoding="async" style="border-width: 0px; margin: 0px 10px" src="http://infotech.davidszpunar.com/wp-content/uploads/2008/02/truecrypt-logo.gif" border="0" alt="TrueCrypt Logo" width="25" height="33" align="left" /></a> Version 5.0 of the <a title="TrueCrypt homepage" href="http://www.truecrypt.org/">TrueCrypt</a> encryption software was released on Feb. 5th. I ran into this news on <a title="Hackzine homepage" href="http://www.hackszine.com/">Hackzine</a> where <a title="Hackzine: TrueCrypt for OS X" href="http://www.hackszine.com/blog/archive/2008/02/truecrypt_for_os_x.html">they mentioned Mac OS X support</a> as a new TrueCrypt feature. That&#8217;s cool, but I don&#8217;t use Mac, so what? I&#8217;ll upgrade soon, since I&#8217;ve been using TrueCrypt for over a year and love it, but what&#8217;s the hurry? But at the end of the article, I spotted a blurb about a much more exciting feature:</p>
<blockquote><p>In the Windows and Linux versions a special bootloader is available that lets you encrypt your entire system drive. It doesn&#8217;t look like that option is available in the OS X version.</p></blockquote>
<p><em>What? <a title="TrueCrypt Documentation: System Encryption" href="http://www.truecrypt.org/docs/?s=system-encryption">Whole-drive encryption of the system drive</a> is now available in Windows and/or Linux?</em> <strong>(Clarification: <a title="TrueCrypt Manual: Operating Systems Supported for System Encryption" href="http://www.truecrypt.org/docs/?s=sys-encryption-supported-os">Only Windows is supported</a> right now.) </strong>This I&#8217;ve gotta see. I&#8217;ve looked at some laptop disk encryption tools in the past, and they&#8217;re nice but generally not cheap (whether software or specialized hardware). But open source is better than cheap, and TrueCrypt is already considered to be high quality. It&#8217;s written well (important where security software is concerned) and is in active development. The new version also promises significant speed increases.</p>
<p>I&#8217;ve installed the <a title="Download TrueCrypt current version" href="http://www.truecrypt.org/downloads.php">new version</a> on my laptop. Do I dare try out the encryption feature? I do have most (not all) of my data backed up, the important stuff at least. Maybe I&#8217;ll investigate this through the weekend, make a decision, and possibly try it out. <em>Possibly.</em> Fire is fun to play with and very powerful, but you have to know what you&#8217;re doing!</p>
<p><strong><em>UPDATED after a night&#8217;s sleep: </em>Yes, I dared.</strong> Before going to bed I started the process to encrypt the entire system partition on my laptop. I don&#8217;t know precisely how long it took; it was projecting 2-3 hours left when I went to bed (shortly after starting it) and was done when I got up. The process is slick, I&#8217;ll give them credit for that. They require that you burn a recovery disc (and verify it) before you can continue, just in case, and they also verify that the bootloader works before allowing the encryption process to begin. I haven&#8217;t used the system enough to know whether there is a significant speed penalty when the partition is encrypted. It seems a touch sluggish but still responsive, but within the normal operating parameters depending on the day! <strong>The biggest downside: hibernation is no longer supported.</strong> Standby is an option, but the system will not hibernate (if you try, TrueCrypt stops you and provides a helpful message about why it won&#8217;t work). I generally hibernate all the time when not using my laptop. I&#8217;ll try using Standby for a while and see how happy I am with it. Not sure if it&#8217;s a deal-breaker yet.</p>
<p>As a precaution, the boot loader offers the option to, with the correct password, decrypt the entire disk without needing to boot into Windows, if Windows gets corrupted. There are several other handy &#8220;rescue&#8221; methods in the boot loader (on the hard drive and on the bootable rescue disc). I am extremely impressed with the quality of the thought and effort put into this whole-disk encryption feature, and although I haven&#8217;t tried the <a title="Kyle Sagarsee: Bitlocker" href="http://www.ksagarsee.com/2007/11/09/bitlocker/">Vista Bitlocker method</a>, TrueCrypt certainly sounds a bit easier (but it doesn&#8217;t integrate with the TPM chip, if one exists). There are options in the setup to set up encryption to work with multi-boot systems, but it warns that this requires advanced knowledge to set up. And, of course, you need a dual-boot system, which I don&#8217;t have at the moment.</p>
<p><strong>UPDATE: The new version 5.1 <a title="My post: TryCrypt 5.1 Does Hibernation, Kind Of" href="http://infotech.davidszpunar.com/2008/03/11/new-truecrypt-51-does-hibernation-kind-of/">has hibernation support</a>, and version 5.1a Beta actually makes it work on my laptop. I&#8217;m back encrypted!</strong></p>]]></content:encoded>
					
					<wfw:commentRss>/2008/02/07/truecrypt-5-whole-disk-encryption-and-os-x-support/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
		<item>
		<title>iTunes Store breaks, ISA 2004 SP3 to blame</title>
		<link>/2008/01/10/itunes-store-breaks-isa-2004-sp3-to-blame/</link>
					<comments>/2008/01/10/itunes-store-breaks-isa-2004-sp3-to-blame/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Thu, 10 Jan 2008 17:39:31 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[ISA 2004]]></category>
		<category><![CDATA[ISA 2004 Service Pack]]></category>
		<category><![CDATA[iTunes]]></category>
		<category><![CDATA[Microsoft ISA]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2008/01/10/itunes-store-breaks-isa-2004-sp3-to-blame/</guid>

					<description><![CDATA[This past Tuesday, I installed ISA 2004 Service Pack 3. I&#8217;ve got a recent configuration backup from the last time I had some SSL certificate issues (that was fun enough I think I&#8217;ve blocked it out too much to blog about it!), so I figured trying it out couldn&#8217;t hurt, and it had a lot [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>This past Tuesday, I installed <a href="http://www.microsoft.com/technet/downloads/isa/2004/servicepacks/default.mspx" title="Microsoft: ISA 2004 Service Packs"><span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> 2004 Service Pack 3</a>. I&#8217;ve got a recent configuration backup from the last time I had some <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span> certificate issues (that was fun enough I think I&#8217;ve blocked it out too much to blog about it!), so I figured trying it out couldn&#8217;t hurt, and it had a lot of fixes. So I start the install through Automatic Updates before I go home for the evening, since if something happens fewer will notice after hours. As I pull into my driveway, my phone alerts me that Exchange ActiveSync failed, and I get an SMS notification from our <a href="http://www.websitepulse.com/" title="WebSitePulse Monitoring">monitoring service</a> saying that <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> could not be pinged. I hope the system is just restarting the Firewall service and it will come back up. Two hours later, it hasn&#8217;t. I drive back in, hit Restart After Automatic Updates (you know what I mean), and let it reboot. I am very, very happy to report that it worked! After the reboot, internet access worked my Treo was able to sync again!</p>
<p>Something interesting to note is that while inbound traffic from the internet appeared to be blocked before the restart,  I was able to use Remote Desktop from another server on the internal network to remotely instruct <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> to reboot. So it had not locked down all network access, just external. Good to know if you administer the box primarily via remote control! In fact, due to a lack of <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'A KVM switch allows you to use one set of display and input devices to control more than one computer.','caption', 'Keyboard, Video and Mouse' );"><acronym class="uttAbbreviation">KVM</acronym></span> switch ports, I have to manually plug the keyboard/monitor/mouse back in to <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> physically if I want to work on the console.</p>
<p>Although everything appeared to be functioning normally, today I got a report from a user who was getting a network error when attempting to connect to the iTunes Store from within iTunes. I tried it on my desktop, and got the same error. Fortunately, I remembered that back when I installed a prior <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> service pack (I don&#8217;t recall if it was 1 or 2), I had a similar problem and was able to track down the issue to the Compression Filter in <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span>. If you go in the <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> Management Console to Configuration-&gt;Add-ins and check the Web Filters tab, by default there is a &#8220;Compression Filter&#8221; enabled (the description: &#8220;Enables <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'HyperText Transfer Protocol' );"><acronym class="uttInitialism">HTTP</acronym></span>/HTTPS compression&#8221;). Disabling this filter allowed iTunes Store to work just fine!</p>
<p>However, the reverse is true in <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> 2004 Service Pack 3. <strong>If you have disabled the Compression Filter, you must re-enable it for the iTunes Store to work in Service Pack 3!</strong> This is very useful information, so I thought I&#8217;d share! If you don&#8217;t know why iTunes Store doesn&#8217;t work, it can take a bit of Googling to determine the problem, at least it did for me originally. Perhaps the issue is more widely known by now.</p>]]></content:encoded>
					
					<wfw:commentRss>/2008/01/10/itunes-store-breaks-isa-2004-sp3-to-blame/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>Pictures of SteadyState Internet Cafe Computers</title>
		<link>/2007/10/28/pictures-of-steadystate-internet-cafe-computers/</link>
					<comments>/2007/10/28/pictures-of-steadystate-internet-cafe-computers/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Mon, 29 Oct 2007 03:47:21 +0000</pubDate>
				<category><![CDATA[Content Filtering]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Firefox]]></category>
		<category><![CDATA[internet cafe]]></category>
		<category><![CDATA[lockdown]]></category>
		<category><![CDATA[SteadyState]]></category>
		<category><![CDATA[youth]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/10/28/pictures-of-steadystate-internet-cafe-computers/</guid>

					<description><![CDATA[I&#8217;ve been promising pictures of the Youth Internet Cafe running Firefox and Microsoft SteadyState but first I forgot, then I took the pictures and didn&#8217;t upload them, then I uploaded them recently but haven&#8217;t posted yet. Oh well. They&#8217;re here now! I uploaded nine photos to Flickr, you can see them all in the Lakeview&#8217;s [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>I&#8217;ve been <a href="http://infotech.davidszpunar.com/2007/07/31/windows-steadystate-lockdown-and-the-youth-internet-cafe/#toc-physical-installation" title="My post: Windows SteadyState Lockdown and the Youth Internet CafÃ©">promising pictures</a> of the Youth Internet Cafe running Firefox and Microsoft SteadyState but first I forgot, then I took the pictures and didn&#8217;t upload them, then I uploaded them recently but haven&#8217;t posted yet. Oh well. They&#8217;re here now! I uploaded nine photos to Flickr, you can see them all in the <a href="http://www.flickr.com/photos/existdifferently/sets/72157602646113391/detail/" title="My Flickr: Lakeview's Youth Internet Cafe set">Lakeview&#8217;s Youth Internet Cafe set</a>. Here are a couple:</p>
<p><a href="http://www.flickr.com/photos/existdifferently/1714151730/in/set-72157602646113391/" title="My Flickr: Youth Internet Cafe desktop closeup"><img decoding="async" src="http://farm3.static.flickr.com/2293/1714151730_089c41043b_m.jpg" alt="Closeup of Youth Internet Cafe monitor and desktop." border="0" height="180" width="240" /></a></p>
<p><a href="http://www.flickr.com/photos/existdifferently/1714140630/in/set-72157602646113391/" title="My Flickr: Youth Internet Cafe: two workstations"><img decoding="async" src="http://farm3.static.flickr.com/2360/1714140630_4ec2f30025_m.jpg" alt="Two of Youth Internet Cafe workstations" border="0" height="180" width="240" /></a></p>
<p>So far it&#8217;s holding up to the abuse and none of the systems have been hacked that I know of! At our recent Volunteer Dinner, the workstations served double-duty as aquariums. Well, I put an ocean-with-fish screensaver on each system to help complement the overall ocean party theme. It worked pretty well! I didn&#8217;t take any photos, but the screensavers are still installed. So you can expect pictures of a re-creation in the next ten years, unless the computers are replaced before that. Ha ha.</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/10/28/pictures-of-steadystate-internet-cafe-computers/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>Firefox Updates and Windows SteadyState</title>
		<link>/2007/08/15/firefox-updates-and-windows-steadystate/</link>
					<comments>/2007/08/15/firefox-updates-and-windows-steadystate/#respond</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Wed, 15 Aug 2007 17:08:12 +0000</pubDate>
				<category><![CDATA[Content Filtering]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Firefox]]></category>
		<category><![CDATA[internet cafe]]></category>
		<category><![CDATA[lockdown]]></category>
		<category><![CDATA[SteadyState]]></category>
		<category><![CDATA[youth]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/08/15/firefox-updates-and-windows-steadystate/</guid>

					<description><![CDATA[Firefox Upgrades Interfere with Kiosks I ran into a small issue with the SteadyState/Firefox setup that was a relatively easy fix: Firefox tried to update itself and the theme when new versions came out. Why it does this as a limited user when it can&#8217;t run the upgrade (for the program itself; the theme should [&#8230;]]]></description>
										<content:encoded><![CDATA[<h2>Firefox Upgrades Interfere with Kiosks</h2>
<p><!--TOC-->I ran into a small issue with the <a href="http://infotech.davidszpunar.com/2007/07/31/windows-steadystate-lockdown-and-the-youth-internet-cafe/" title="My post: Windows SteadyState Lockdown and the Youth Internet CafÃ©">SteadyState/Firefox setup</a> that was a relatively easy fix: Firefox tried to update itself and the theme when new versions came out. Why it does this as a limited user when it can&#8217;t run the upgrade (for the program itself; the theme should work if it weren&#8217;t locked down) is beyond me, maybe I&#8217;ll file a bug report or something. Anyway, to get rid of the upgrade reminder, I logged in as Administrator and installed the Firefox program upgrade. Then I unlocked the profile and disabled Disk Protection, logged in as the locked down user, not not locked down, and upgraded the theme. Then I changed the Options (Tools-&gt;Options-&gt;Advanced-&gt;Update) and unchecked all of the automatic update options. Now updates won&#8217;t automatically (try to) apply, and I don&#8217;t even have to worry about security holes much because of the Disk Protection feature. I also took the opportunity to install the <a href="https://addons.mozilla.org/en-US/firefox/addon/616" title="Auto Reset Browser Firefox extension">Auto Reset Browser extension</a> and disable the old auto-restart mechanism (see below for the reasons).</p>
<h2>Accessing Firefox Settings</h2>
<p>To get to the Firefox settings, because of the <a href="https://addons.mozilla.org/en-US/firefox/addon/1659" title="R-Kiosk Firefox extension">R-Kiosk extension</a> disabling menu access, I had to use the Firefox (safe mode) option from the Start menu, tell the statup box to disable add-ons and restart, and then it came up with no theme and no extensions active. I made my settings changes, installed the Auto Reset Browser extension, re-enabled the theme and the R-Kiosk extension, and restarted. Back to normal, with all changes made!</p>
<h2>Firefox Auto-Restart Method</h2>
<p>Paul Marc left a comment on my original post asking about <a href="http://infotech.davidszpunar.com/2007/07/31/windows-steadystate-lockdown-and-the-youth-internet-cafe/#comment-339" title="Paul Marc's comment on my original post">how I made Firefox auto-restart</a> if closed and on idle. I was using a batch file called <strong>start.bat</strong> that I found online, but I can&#8217;t seem to locate it again with Google (I recall it took some searching to find originally as well). I&#8217;ll have to grab the bookmark off of one of the computers I set it up on when I am able.</p>
<p>It seemed like it was a great solution when I set it up. However, I had several issues crop up in actual use. Sometimes it would get &#8220;stuck&#8221; in a loop of starting unending new Firefox windows as fast as the computer would open them. The only solution was to log off or restart (or kill the script, but the Task Manager won&#8217;t open under lockdown!). This only happens sometimes, and I&#8217;m not exactly sure why, but it makes the system unusable when it does happen.</p>
<p>I have made the above changes on three of the four computers (the last one isn&#8217;t switched yet because I ran out of time), setting them to <em>not</em> use the start.bat file, and instead installing the <a href="https://addons.mozilla.org/en-US/firefox/addon/616" title="Auto Reset Browser Firefox extension">Auto Reset Browser extension</a> in Firefox. It restarts the browser after every five minutes idle. The downside is, if a user closes the browser manually, it doesn&#8217;t reopen automatically. There is one icon on the desktop though, to open Firefox, so I don&#8217;t think this will be an issue, although it&#8217;s not as nice as the original solution when it worked correctly. And either way, closing manually or on idle, Firefox still runs the Clear Private Data option I had set up (per my original post) to get rid of the prior user&#8217;s cookies or other saved information.</p>
<h2>Network Connection Details</h2>
<p>In my original post, I neglected to include details of the network connections for the locked down systems. It&#8217;s pretty simple: stick the computers on the same VLAN (wired) as the free Wi-Fi internet access. I added each system&#8217;s <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'The unique address assigned to every network card. (&lt;a href=&quot;http://en.wikipedia.org/wiki/MAC_address&quot;&gt;link&lt;/a&gt;)','caption', 'Media Access Control' );"><acronym class="uttInitialism">MAC</acronym></span> address into the Nomadix gateway so it doesn&#8217;t ask for a username or password, and I can control bandwidth on a per-computer basis (they don&#8217;t have much). The free Wi-Fi is firewalled so only <a href="http://www.opendns.com/" title="OpenDNS homepage">OpenDNS</a> can be contacted over the DNS ports, so they are subject to the <a href="http://blog.opendns.com/2007/06/10/adult-site-blocking/" title="OpenDNS Blog: Adult site blocking now available on OpenDNS">OpenDNS adult site blocking</a> we have in place, just like everyone else.</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/08/15/firefox-updates-and-windows-steadystate/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>PassPack Your Passwords: Get Them Anywhere, Securely and Freely</title>
		<link>/2007/08/13/passpack-your-passwords-get-them-anywhere-securely-and-freely/</link>
					<comments>/2007/08/13/passpack-your-passwords-get-them-anywhere-securely-and-freely/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Mon, 13 Aug 2007 05:08:56 +0000</pubDate>
				<category><![CDATA[Cool Services]]></category>
		<category><![CDATA[Cool Tools]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Websites]]></category>
		<category><![CDATA[PassPack]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[review]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/08/13/passpack-your-passwords-get-them-anywhere-securely-and-freely/</guid>

					<description><![CDATA[I discovered a service called PassPack. The basic premise is this: Create an account, store all your passwords in it, log back in as-needed to retrieve them. "But wait!" you might say, "that's stupid, why trust a random website to secure your passwords, just run one of the countless free Windows apps to store your info, and a lot of them will even automatically log you in via your web browser to websites." Normally, I'd agree with you. But PassPack is doing things a bit differently...]]></description>
										<content:encoded><![CDATA[<p>On Saturday (OK, it was after midnight, so <em>technically</em> it was Sunday &#8212; but I tend to count time before I sleep as one day, time after I wake up in the morning as the next day &#8212; since I stay up past midnight often enough this just makes it easier) I <a href="http://www.sciencetext.com/packing-up-passwords.html" title="Significant Figures: Pack Up Your Passwords with Passpack">discovered</a> a service called <a href="http://www.passpack.com/" title="PassPack homepage">PassPack</a>. The basic premise is this: Create an account, store all your passwords in it, log back in as-needed to retrieve them. <em>&#8220;<strong>But wait!</strong>&#8220;</em> you might say, <em>&#8220;<strong>that&#8217;s stupid,</strong> why trust a random website to secure your passwords, just run one of the countless free Windows apps to store your info, and a lot of them will even automatically log you in via your web browser to websites.&#8221;</em> Normally, I&#8217;d agree with you. But PassPack is doing things a bit differently.</p>
<p>PassPack gives you a free account (did I mention it was free?). <strong>You create</strong> a user ID, a passphrase, and a Packing Key, all distinct. PassPack creates an encrypted container using your Packing Key, which is encrypted on your web browser using JavaScript and standards-based encryption. Only this encrypted &#8220;bundle,&#8221; without your Packing Key, is then stored on the PassPack servers. <strong>Want a password?</strong> Log in, enter your Packing Key if it&#8217;s timed out (5 minutes by default, up to 15 minutes), find the relevant account alphabetically, by tag, or search (all very Web 2.0 and AJAXy-smooth), and click it to&#8230;reveal your login name and a scrambled-looking (unreadable) password field. Click in this field and use the Ctrl+C keyboard shortcut to copy the password, and paste in to the site in question (<span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Uniform Resource Locator' );"><acronym class="uttInitialism">URL</acronym></span> also saved as an option to make it easy). This means the password never appears on the screen, it&#8217;s just stored directly in your clipboard, and you don&#8217;t have to retype it.</p>
<p>So you can copy and paste the password, so what? Well, they also have an auto-login <strong>bookmarklet</strong> you can save in your browser. Save the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Uniform Resource Locator' );"><acronym class="uttInitialism">URL</acronym></span> of the login page along with the password at PassPack, and then just click the Open and Login link within PassPack to open the website in a new window. Then, click the &#8220;PasssPack It!&#8221; bookmarklet you previously set up. If the site has been &#8220;trained&#8221; before (even by another user), it fills in the username and password fields and clicks Login to get you into the site! If it&#8217;s not been trained for this site, you are walked through a very simple process of clicking the bookmarklet, clicking the username field, then the password field, then the Login button to train the system. So far out of about twenty sites, only two have had issues and not been trained successfully (a Plesk 7.5 dedicated server control panel and the <a href="http://www.zoho.com/" title="ZoHo homepage">ZoHo</a> group of sites, including the <a href="http://citpodcast.wiki.zoho.com/" title="Church IT Podcast ZoHo Wiki">Church IT Podcast Wiki</a>, were the malfunctioning sites, which have been reported to PassPack); these can still have their login information memorized like any other account, on- or off-line, they just won&#8217;t auto-login with the bookmarklet.</p>
<p>The folks at PassPack have implemented a few other nice features besides the slick and speedy interface and somewhat novel readable-only-by-you encryption scheme:</p>
<ul>
<li>They have a nice anti-phishing setup in place to prevent your PassPack credentials from being phished easily.</li>
<li>If you keep the site open, it functions offline and can be saved to their server the next time you connect (it also auto-saves if you don&#8217;t disable this option).</li>
<li>One-time keys are available for you to print out and carry with you. If using a public internet terminal, log in to PassPack with one of these one-time-use keys, and copy-and-paste the scrambled password you need. Then you never have to type a usable password into the insecure computer (for PassPack or the target site).</li>
<li>Export and Import of your data, in unencrypted format, if you wish to switch between other password-saving applications that also give you access to your data in text format.</li>
<li>Backup and Restore of your encrypted data, so you have a copy on your computer in addition to on their server (you choose whether the backup will use your regular Packing Key or a unique one).</li>
<li>They will generate a unique password for you to use when registering a new account somewhere, which they will of course remember for you.</li>
</ul>
<p>You may be wondering where this Packing Key thingy comes from. (I can hear you now, <em>&#8220;David, this thing is awesome, sign me up, but what the heck is a Packing Key anyway?!&#8221;</em>) PassPack has some of the <a href="http://passpack.wordpress.com/tag/help/" title="PassPack Help">best help I&#8217;ve ever read</a>, which is even available contextually when you click Help within the site. They handily have an <a href="http://passpack.wordpress.com/2006/12/14/password-security-packing-keys/" title="PassPack Blog: Password Security &amp; Packing Keys">answer about Packing Keys</a> and why they&#8217;re so handy. They do a much better job of explaining that and just about everything else about the service than I could, given that they wrote it and I&#8217;ve just used it for a day. But I&#8217;ve found it to be exciting, apparently secure, well-designed, and actually fun.</p>
<p>It should go without saying that besides the great interface, being able to access your passwords from any web browser very easily, along with the off-site storage, is probably the single biggest benefit to using PassPack over a Windows utility. Even the auto-login bookmarklet it cross-platform, cross-browser code and is a simple JavaScript bookmark &#8212; no need to install a Firefox Extension, IE Add-In, or any other code running on your machine outside of JavaScript.</p>
<p>I do see one potential downside: their <a href="https://www.passpack.com/info/legal/" title="PassPack Terms of Service">Terms of Service</a> contain several limitations (yes I read it! Well, the parts they highlighted at least&#8230;):</p>
<ol>
<li> You are not allowed to store information about financial accounts (banks, etc.), although this may be legal CYA considering I don&#8217;t know how they could possibly enforce this given they don&#8217;t have access to your data.</li>
<li>If you don&#8217;t login at least once every six months, your account is &#8220;inactive&#8221; and they delete everything.</li>
<li>You only get 32k of storage per account (they estimate 75-100 entries worth of entries), with no upgrades available yet. Accounts active before August 1st (missed it by less than two weeks, darn!) got 128k of storage (150-200 estimated entries).</li>
</ol>
<p>I&#8217;m sure <a href="http://www.passpack.com/" title="PassPack homepage">PassPack</a> intends on offering upgraded service with more storage at some point, but those three conditions may limit my use of their service, and possibly yours. I know I have 23 entries already saved, and I&#8217;ve barely scratched the surface with the quantity of online accounts I maintain. It&#8217;s at least worth a shot in my opinion. If you like the concept and want an alternative, <a href="http://www.clipperz.com/" title="Clipperz homepage">Clipperz</a> is worth a look, it&#8217;s also free and PassPack even has <a href="http://passpack.wordpress.com/2007/04/10/passpack-and-clipperz-the-difference/" title="PassPack Blog: PassPack and Clipperz: The Difference?">a comparison of their two services</a>. It doesn&#8217;t do the anti-phishing stuff like PassPack but it does have many other similar features, which I have not tested extensively. They also do not prohibit the storage of financial details and actually provide a template to hold credit card and bank account information. They also keep the data from leaving your browser unless it&#8217;s encrypted so they have no access when it&#8217;s on their servers.</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/08/13/passpack-your-passwords-get-them-anywhere-securely-and-freely/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>VMware Not Quite As Secure As You Might Think</title>
		<link>/2007/08/04/vmware-not-quite-as-secure-as-you-might-think/</link>
					<comments>/2007/08/04/vmware-not-quite-as-secure-as-you-might-think/#respond</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Sat, 04 Aug 2007 15:57:05 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Virtualization]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/08/04/vmware-not-quite-as-secure-as-you-might-think/</guid>

					<description><![CDATA[I must admit I was a bit surprised by this on one hand, and not at all surprised on the other. When you understand how virtualization works, it&#8217;s easy to think &#8220;wow, that creates a nice black box, nothing could ever get out of there automatically to the host computer, or even know the host [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>I must admit I was a bit surprised by this on one hand, and not at all surprised on the other. When you understand how virtualization works, it&#8217;s easy to think &#8220;wow, that creates a nice black box, nothing could ever get out of there automatically to the host computer, or even know the host exists!&#8221; Then you realize that because of the specific hardware <a href="http://www.vmware.com/" title="VMware homepage">VMware</a> or other virtualization software uses, there are several ways for a program to discover that it&#8217;s running on a virtual machine (I won&#8217;t go into detail on these, I haven&#8217;t done much research but I&#8217;m sure Google has&#8230;). Then, if you know anything about computer security, you realize that if it&#8217;s on a computer, connected to a network, there&#8217;s probably a way to get in if you have enough time, knowledge and resources, because computers are complex and new attacks pop up every day. Why should VMware be any different?</p>
<p>To the (sparse) details already: <a href="http://www.pauldotcom.com/2007/07/31/escaping_from_the_virtualizati.html" title="PaulDotCom: Escaping From The Virtualization Cave">PaulDotCom has an article</a> discussing a program that runs on a VMware virtual machine, and in about a minute crashes the machine and then runs a program on the host machine. Whether this was an ESX Server or a VMware Server install is not clear, and neither are most of the other details. It does seem that running VMware Tools on the virtual server might be the attack vector and you would be safe if not running them, but again, the details are sketchy. <a href="http://www.cutawaysecurity.com/blog/archives/170" title="Cutaway: VMGameOver?">Cutaway also has some commentary</a> on the new security hole. Originally via <a href="http://www.computerworld.com/blogs/node/5936" title="Martin McKeay's Computerworld blog">Martin McKeay&#8217;s blog</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/08/04/vmware-not-quite-as-secure-as-you-might-think/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Windows SteadyState Lockdown and the Youth Internet CafÃ©</title>
		<link>/2007/07/31/windows-steadystate-lockdown-and-the-youth-internet-cafe/</link>
					<comments>/2007/07/31/windows-steadystate-lockdown-and-the-youth-internet-cafe/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Tue, 31 Jul 2007 11:30:50 +0000</pubDate>
				<category><![CDATA[Content Filtering]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Firefox]]></category>
		<category><![CDATA[internet cafe]]></category>
		<category><![CDATA[lockdown]]></category>
		<category><![CDATA[SteadyState]]></category>
		<category><![CDATA[youth]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/07/31/windows-steadystate-lockdown-and-the-youth-internet-cafe/</guid>

					<description><![CDATA[Our new youth facility now has a four-computer internet cafÃ©. I've already written twice about my plans and research leading up to implementation, specifically about computer lockdown software. A couple of weeks ago, I mentioned briefly that we had changed course and decided to use Microsoft Windows SteadyState as our lockdown software of choice, mainly due to...]]></description>
										<content:encoded><![CDATA[<p>This is a long one (about 1800 words), so I&#8217;m giving you a table of contents, and breaking it up so it&#8217;s not all on the front page (the first post where I&#8217;ve done so, and I&#8217;ve had some other long ones!).</p>
<h2>Overview</h2>
<p><!--TOC-->Our new youth facility now has a four-computer internet cafÃ©. I&#8217;ve already written twice about my plans and research leading up to implementation, specifically about computer <a href="http://infotech.davidszpunar.com/2007/03/23/public-computer-lockdown-options/" title="My post: Public Computer Lockdown Options">lockdown</a> <a href="http://infotech.davidszpunar.com/2007/04/13/public-computer-lockdown-and-fortres-grand/" title="My post: Public Computer Lockdown and Fortres Grand">software</a>. A couple of weeks ago, I <a href="http://infotech.davidszpunar.com/2007/07/16/double-dutch-aka-it-has-a-foreign-volunteer/" title="My post: Double Dutch, aka IT Has A Foreign Volunteer!">mentioned briefly</a> that we had changed course and decided to use <a href="http://www.microsoft.com/windows/products/winfamily/sharedaccess/default.mspx" title="Microsoft Windows SteadyState homepage">Microsoft Windows SteadyState</a> as our lockdown software of choice, mainly due to the price (free!).</p>
<p>We (Dutch volunteer Jeroen and I) were physically installing the computers/monitors/etc. in the youth lobby area when I thought, &#8220;hey, Microsoft just released some updated lockdown software, let&#8217;s try it out.&#8221; We hadn&#8217;t yet purchased the Fortres Grand software, although I had it approved. So I downloaded SteadyState, installed it, and messed around for a few minutes. It was so easy, even my mom could do it! Well, okay, I&#8217;ve been teaching her computers for a while and I might still have to walk her through this one over the phone, but I have no doubt she&#8217;d make it work :-)  The installation went smoothly, the lockdown options (we wanted pretty much the tightest lockdown possible) were easy to select, and the hard disk protection (which discards changes on reboot) was easy to enable and control from within the main SteadyState console. I haven&#8217;t had experience with Microsoft&#8217;s old Shared Computer Toolkit, but from what I understand it was more difficult to combine all the options together into one functional system, and they appear to have fixed all of this in SteadyState.</p>
<h2>Lockdown Features</h2>
<p>In the SteadyState console, there are three items under Global Computer Settings: Set Computer Restrictions, Schedule Software Updates, and Protect the Hard Disk. The Set Computer Restrictions option lets you change things such as whether to display the last username in the logon screen, prevent users from writing to <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Universal Serial Bus' );"><acronym class="uttInitialism">USB</acronym></span> drives, turn the Welcome Screen on and off, and other miscellaneous things that affect the whole computer, not just particular user(s).  I turned most of these on. I&#8217;m not writing this with access to the computers I set up, so I&#8217;m going from memory on this (and everything else) but if you have any questions about specifics please leave a comment!</p>
<p>You can create or import users/profiles that SteadyState can then manage with a selection of lockdown options going from low to high security, but at each level it just selects a more restricted subset of the detailed options and lets you customize away. This is similar to the functionality of the <a href="http://www.fortresgrand.com/products/f101/f101.htm" title="Fortres Grand: Fortres 101 homepage">Fortres 101</a> software. All we tested was the highest security possible, locking down almost everything and only allowing the Mozilla Firefox executable to run. However, we did have to allow command prompt access to get the Firefox auto-restart trick below to work, although with the GUI and keyboard shortcuts this locked down, no one should be able to access the command line except through the batch file the Firefox shortcut links to for this trick to work.</p>
<p>Testing the lockdown settings to find the right mix can be a bit tricky because you must save the settings, log out, log in as the limited user, test, log out, and log back on to the administrative account again. It&#8217;s tedious, but once you have what you want, you can duplicate the settings more easily on other systems. The Export/Import Profile function works, but it imports a default user profile with the lockdown settings. Be careful with this, because it means you must wait until after you import a user into SteadyState from an exported profile before logging in and doing any customization to their desktop (display options, Start Menu positioning, etc.) as any customization you&#8217;ve done will be deleted if you import a user over top of your existing user! Found this out the hard way &#8212; once :-)</p>
<p><span id="more-91"></span></p>
<h2>Firefox Does Its Own Privacy Work</h2>
<p>Firefox has some great options for &#8220;Clearing Private Data&#8221; such as cache, cookies, history, saved passwords, authenticated sessions, etc., which for most Firefox users is either a manual option or something it prompts you to do when you close Firefox. Because of the multi-user environment, we instead set the options, available through the Firefox Tools-&gt;Options panel,  to automatically clear private data when the browser was closed, with no prompting. That way someone logged into Gmail, Hotmail, Facebook, or lets face it, MySpace (one site I still refuse to sign up for :-) will be logged out when Firefox closes, safe for the next person to use. Let&#8217;s face it, these are teenagers we&#8217;re talking about here &#8212; do you think they&#8217;re going to remember to log off? Not likely in the vast majority of cases.</p>
<p>I found a batch file with some Google searching (I&#8217;ll have to re-locate it and post an update if anyone is interested) that, when run via a command line or a shortcut and passed the path to a .exe file, runs the file but monitors it and if the process ends, it restarts it automatically. So Firefox is in the Startup folder in the Start Menu, but run with this batch script. When someone closes Firefox, it clears their data, is automatically restarted, and goes back to the youth homepage automatically, ready for the next user!</p>
<p>But what if people don&#8217;t close the browser? We set up a Scheduled Task to kill the firefox.exe process after 5 minutes of the computer being idle. Same effect as the user closing the browser, and it automatically reopens still. This is a touch buggy, as occasionally Firefox will instead of reopening once, reopen window after window after window after window&#8230;and of course the computer is so locked down you can&#8217;t kill the process manually. It requires a logout or restart to fix. This is still on my &#8220;to track down&#8221; list, but it&#8217;s the last little piece of the puzzle, and generally it works fine. I&#8217;m sure it&#8217;s an issue with either the batch file, the scheduled task, or both interacting somehow.</p>
<h2>Thematic Full Screen</h2>
<p><!--TOC-->The theme we chose for Firefox is called <a href="https://addons.mozilla.org/en-US/firefox/addon/4908" title="NASA Night Launch theme">NASA Night Launch</a>. It&#8217;s a beautiful theme, which shows an awesome shuttle launch shot as the blank background before a tab finishes rendering, and has equally nice toolbar backgrounds and a custom throbber (the top-right icon that moves while a page is loading, if you didn&#8217;t know). The grays and blacks in this theme look wonderful with our current homepage, <a href="http://www.infusionstudents.com/" title="Infusion Student Ministries homepage">www.infusionstudents.com</a>, as well as the black LCD monitors mounted to the wall (pictures to follow later). A new version of this theme was released on July 22nd, after we set up the computers, so I will consider upgrading the theme at some point soon.</p>
<p>To make the slickest looking interface possible, we applied the <a href="https://addons.mozilla.org/en-US/firefox/addon/1659" title="R-Kiosk extension">R-Kiosk extension</a> to Firefox to force it into fullscreen mode when it starts, getting rid of the title bar and any non-themed borders. We did apply the change to user.js that provides the navigation menu so the address bar and back/forward function. It looks really good with this extension combined with the theme!</p>
<p>While looking to see what the theme and extension we used are called, I just ran into an extension called <a href="https://addons.mozilla.org/en-US/firefox/addon/616" title="Auto Reset Browser extension">Auto Reset Browser</a> that for some reason I&#8217;ve never seen before. It looks like it might be a more elegant solution to my earlier problem, but I don&#8217;t know if it will help keep Firefox open if someone manually closes it. I will have to investigate further as time allows.</p>
<h2>Disk Protection</h2>
<p>SteadyState&#8217;s disk protection option, which you must enable separately from the policy lockdown settings, basically makes the hard drive immutable for most purposes. Do anything, reboot, and you&#8217;re back where you started last time. Fortres Grand&#8217;s <a href="http://www.fortresgrand.com/products/cls/cls.htm" title="Fortres Grand: Clean Slate">Clean Slate</a> product has similar functionality. Microsoft has made what I hear are improvements (compared to the Shared Computer Toolkit) in this functionality in that you enable and disable this option from the SteadyState control console just like all the policy options. Give it some time to make a cache file for the temporary disk changes, reboot, and the disk is protected.</p>
<p>The nicest thing is, if you&#8217;re an Adminstrator running SteadyState, and you log in, install a new program, and reboot &#8212; oops, if the disk protection was on you&#8217;d lose all your changes! You can unlock the disk for a time in the console, however. But the best option Microsoft added was a modification to the Log Off screen, prompting you that disk protection is on and giving you the option to discard all changes &#8212; or, <em>keep the changes, restarting to merge the cache onto the hard drive automatically.</em> That&#8217;s a no-brainer option that will continue to save my behind as I update these systems in the future I&#8217;m sure, long past initial setup! I&#8217;ve already used it for a few tweaks here and there.</p>
<h2>No Manual Needed</h2>
<p>SteadyState scores high marks for ease of use; I&#8217;ve still not read <a href="http://www.microsoft.com/downloads/details.aspx?familyid=d64af114-336c-4418-beb7-e074e813b498&amp;displaylang=en&amp;tm" title="Microsoft Windows SteadyState Manual">the manual</a> and only referenced the help file (which opens automatically with the console) a few times. (Well, I did use the manual to refresh my memory while writing this post, but only because I don&#8217;t have access to the real systems at the moment. And this is the first time I&#8217;ve even opened it.)</p>
<h2>Physical Installation</h2>
<p>I don&#8217;t currently have any pictures of the computers handy, so I will leave photos and a description of the mounting process (which comprised more than 50% of the entire operation) to a future post.</p>
<h2>Yet Another Alternate Option</h2>
<p><!--TOC-->In very related news, I did received a reply, although a bit late for me and not really a fit anyway at this point (due to the cost), from when I emailed and <a href="http://castingfromtheserverroom.com/podcast/2007/episode-59-google-themes" title="Casting From The Server Room: Episode 59 - Google Themes (my emailed question is addressed during the podcast)">asked the guys at the Casting From The Server Room podcast</a> for a reminder of what software they had run across as a Deep Freeze competitor. They mentioned it (<a href="http://www.centuriontech.com/products/compuguardcornerstone/" title="CompuGuard CornerStone homepage">CompuGuard CornerStone</a>) in an old episode which I couldn&#8217;t remember, and their &#8220;show notes wiki&#8221; had been lost without a backup. Thanks for the response, guys! Always good to check out alternative options and at least keep abreast of what&#8217;s available in the future. They replied to my question back in March on the air, but I missed three episodes in an otherwise unbroken string of probably 30-40 of their episodes I&#8217;ve listened to without skipping (wouldn&#8217;t you know it was in one of those!), and when I grabbed the back-episode to check out I heard my name again (they&#8217;ve mentioned my comments twice in more recent shows since &#8212; and inspired the new last name pronunciation guide in my <a href="http://infotech.davidszpunar.com/about/" title="About David">About David</a> page)!</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/07/31/windows-steadystate-lockdown-and-the-youth-internet-cafe/feed/</wfw:commentRss>
			<slash:comments>12</slash:comments>
		
		
			</item>
		<item>
		<title>How We&#8217;re Doing Remote Access (VPN, RDP, LogMeIn)</title>
		<link>/2007/07/01/how-were-doing-remote-access-vpn-rdp-logmein/</link>
					<comments>/2007/07/01/how-were-doing-remote-access-vpn-rdp-logmein/#respond</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Sun, 01 Jul 2007 17:53:59 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Remote Access]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/07/01/how-were-doing-remote-access-vpn-rdp-logmein/</guid>

					<description><![CDATA[Mike Mayfield over at Pleasant Valley Baptist Church IT (&#8220;pvcbit&#8221;) posted a question about VPN remote access permissions. I wrote a blog post in March with a little bit of information on this relating to the Microsoft ISA 2004 firewall, but we&#8217;re actually using a combination of services for remote access right now (I mentioned [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Mike Mayfield over at <a href="http://pvbcit.blogspot.com/" title="pvbcit homepage">Pleasant Valley Baptist Church IT</a> (&#8220;pvcbit&#8221;) posted a question about <a href="http://pvbcit.blogspot.com/2007/06/who-has-access-through-vpn.html" title="pvbcit: Who has access through VPN?"><span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> remote access permissions</a>. I wrote a blog post in March with a little bit of information on this <a href="http://infotech.davidszpunar.com/2007/03/06/traditional-vpns-not-just-all-or-nothing-access/" title="My post: VPNS: Not just all or nothing access">relating to the Microsoft <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> 2004 firewal</a>l, but we&#8217;re actually using a combination of services for remote access right now (I mentioned LogMeIn on my prior post as well). Here is another quick look at what we&#8217;re currently doing for <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span>.</p>
<p>Basically, because we have <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span>, I can limit what particular user groups are able to do over their <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connection, just like any other firewall rules. Very few people get file server access at all (actually, me and one guy who connects from his church laptop) over <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span>. The rest are limited to Exchange server connectivity or Remote Desktop primarily, although now that we have <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Remote Procedure Call' );"><acronym class="uttInitialism">RPC</acronym></span> over <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'HTTP protocol using SSL encryption','caption', 'HyperText Transfer Protocol Secure' );"><acronym class="uttInitialism">HTTPS</acronym></span> in place, it&#8217;s much simpler than <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> for the user and so that&#8217;s used almost exclusively for remote Outlook access now, and is as much as most people need (if they have a laptop they have an offline copy of most of their files anyway).</p>
<p>For those that still require remote access to their desktop at work (especially if they don&#8217;t have a church-owned laptop), I&#8217;ve been moving from <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> with Remote Desktop access (complicated to train someone to use since the connection is separate from the RDP client) to LogMeIn.com for remote access.  There&#8217;s a free version and a Pro version, with remote printing and file transfer being the main additional features of Pro. The main benefit? It&#8217;s easy and just requires a web browser, it&#8217;s fast, and not very expensive (with the special we got anyway, or the free version is of course free!). I have run into an issue with a new remote user that hasn&#8217;t gotten LogMeIn to work on their own but I haven&#8217;t had a chance to troubleshoot this yet (I&#8217;m sure it relates to the steps to get the ActiveX or Firefox plugin installed for LogMeIn initially).</p>
<p>We have a Terminal Services server with a handful of user licenses that we use for some volunteers that need remote access from their home computer but don&#8217;t have a dedicated desktop at work. I haven&#8217;t attempted LogMeIn through Terminal Services, but I assume it wouldn&#8217;t work properly with the multiple sessions that make Terminal Services useful, and would only allow access to the console session. For this, we still use <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span>, with a CD created from the <a href="http://www.isaserver.org/img/upl/vpnkitbeta2/cmak.htm" class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'The Connection Manager Administration Kit allows you to create customized Dial-up Networking connectoids or dialers for your VPN or dial-up users.','caption', 'Connection Manager Administration Kit' );"><acronym class="uttInitialism">CMAK</acronym></a> along with an auto-running tutorial created with <a href="http://www.debugmode.com/wink/" title="Wink free Tutorial and Presentation creation software homepage">Wink</a> that walks users through installing the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connectoid (which has all of the settings preset) and starting a <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connection. Using custom commands in the <a href="http://www.isaserver.org/img/upl/vpnkitbeta2/cmak.htm" class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'The Connection Manager Administration Kit allows you to create customized Dial-up Networking connectoids or dialers for your VPN or dial-up users.','caption', 'Connection Manager Administration Kit' );"><acronym class="uttInitialism">CMAK</acronym></a> connectoid, I&#8217;ve included a Remote Desktop settings file that automatically runs upon connection, automatically opening and connecting to the Terminal Server inside the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> once it&#8217;s connected. When Remote Desktop is closed, the connectoid logs off the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span>. The integration of <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> and Remote Desktop isn&#8217;t perfect, but it&#8217;s a lot easier this way (most of the time) than trying to get people to understand connecting to the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> first, then connecting with Remote Desktop manually, and disconnecting in reverse. The more automated the better! These <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connections are of course limited through <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> to be allowed to connect only to the Terminal Server, and only through the RDP protocol.</p>
<p>One thing&#8217;s for sure: when allowing an unmanaged computer on the network, especially as unsupervised as a remote connection is, it pays from a security standpoint to keep the leash as tight as possible! And it&#8217;s the unintentional risks (spyware, viruses, etc.) more often than malicious users that cause a problem. The best part is, protecting from one helps to protect from the other (in general).</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/07/01/how-were-doing-remote-access-vpn-rdp-logmein/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Wireless 802.1x Authentication: Overview</title>
		<link>/2007/05/18/wireless-8021x-authentication-overview/</link>
					<comments>/2007/05/18/wireless-8021x-authentication-overview/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Sat, 19 May 2007 03:52:29 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Wireless]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/05/18/wireless-8021x-authentication-overview/</guid>

					<description><![CDATA[I&#8217;ve been asked to post some information on how I implemented 802.1x authentication in our wireless network. This setup involved a lot of experimentation, and I&#8217;m not completely done although I have a working solution. This post will be a high-level overview of the process. I will post some additional information when I have time [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>I&#8217;ve been <a href="http://infotech.davidszpunar.com/2007/05/08/8021x-port-based-authentication/#comment-111" title="Hunter French's comment on my blog">asked</a> to post some information on how I implemented 802.1x authentication in our wireless network.  This setup involved a lot of experimentation, and I&#8217;m not completely done although I have a working solution.  This post will be a high-level overview of the process.  I will post some additional information when I have time (no guarantees!) that contains a bit more of the nitty-gritty details of some of the steps.  How did I learn?  I had a burning desire to figure out how &#8220;real enterprises&#8221; did wireless security and authentication, so I read, and Googled, and read, and read, and tested, and read, and tested some more.  And that was just with an off-the-shelf Linksys router!  When we got the good equipment and I learned its configuration options, I just needed to do a bit more configuration and testing to get it functional at the level of the Linksys, but with more flexibility.</p>
<p>I&#8217;m using the built-into-Windows-Server <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Microsoft\'s RADIUS server, which comes included as a part of Windows Server. (&lt;a href=&quot;http://www.microsoft.com/technet/network/ias/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', ' 	Internet Authentication Service' );"><acronym class="uttInitialism">IAS</acronym></span>, which is the Microsoft implementation of a <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'A server used for authenticating users against a central server. Can be used for dial-in users, VPN, wireless (802.1x) and other uses. (&lt;a href=&quot;http://en.wikipedia.org/wiki/RADIUS&quot;&gt;link&lt;/a&gt;)','caption', ' 	Remote Access Dial-In User Server' );"><acronym class="uttInitialism">RADIUS</acronym></span> server.  Basically, I set up a profile in the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Microsoft\'s RADIUS server, which comes included as a part of Windows Server. (&lt;a href=&quot;http://www.microsoft.com/technet/network/ias/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', ' 	Internet Authentication Service' );"><acronym class="uttInitialism">IAS</acronym></span> configuration to allow specific Windows Active Directory groups to be allowed &#8220;dial-up&#8221; access through a Wireless port type.  Then I created a new client in <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Microsoft\'s RADIUS server, which comes included as a part of Windows Server. (&lt;a href=&quot;http://www.microsoft.com/technet/network/ias/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', ' 	Internet Authentication Service' );"><acronym class="uttInitialism">IAS</acronym></span> with its IP address and a secret key that I also enter in the wireless access point (AP) where it asks for a <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'A server used for authenticating users against a central server. Can be used for dial-in users, VPN, wireless (802.1x) and other uses. (&lt;a href=&quot;http://en.wikipedia.org/wiki/RADIUS&quot;&gt;link&lt;/a&gt;)','caption', ' 	Remote Access Dial-In User Server' );"><acronym class="uttInitialism">RADIUS</acronym></span> server (while setting up <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'A standard used to encrypt and authenticate wireless network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&quot;&gt;link&lt;/a&gt;)','caption', 'Wi-Fi Protected Access' );"><acronym class="uttAbbreviation">WPA</acronym></span>/WPA2 authentication, not the Pre-Shared Key (<span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'WPA-PSK, also known as WPA Personal, this wireless network security setting uses a single key shared among clients and base station for authentication and encryption of network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/WPA-PSK&quot;&gt;link&lt;/a&gt;)','caption', 'Pre-Shared Key' );"><acronym class="uttAbbreviation">PSK</acronym></span>) kind).  If I did everything right (insert hours of testing and learning here), I can connect to the wireless <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Very basically, the string that shows up as the &quot;network name&quot; in an 802.11x wireless network. (&lt;a href=&quot;http://en.wikipedia.org/wiki/SSID&quot;&gt;link&lt;/a&gt;)','caption', 'Service Set Identifier' );"><acronym class="uttInitialism">SSID</acronym></span> I configured by specifying a username and password (or to use the Windows logon credentials) in the settings, rather than needing a pre-shared key that&#8217;s the same for everyone.</p>
<p>If I go a step further and put a certificate on the server that the clients trust, I can also authenticate with the certificates rather than the username/password credentials, which is actually more secure due to the certificate being longer, more random, and harder to obtain than a username and password (this is why I limit access for now to users in the Active Directory group I specify, creating fewer users with wireless login privileges).  I haven&#8217;t completed the certificate step of the process, and I&#8217;m still running a <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'A standard used to encrypt and authenticate wireless network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&quot;&gt;link&lt;/a&gt;)','caption', 'Wi-Fi Protected Access' );"><acronym class="uttAbbreviation">WPA</acronym></span>-PSK <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Very basically, the string that shows up as the &quot;network name&quot; in an 802.11x wireless network. (&lt;a href=&quot;http://en.wikipedia.org/wiki/SSID&quot;&gt;link&lt;/a&gt;)','caption', 'Service Set Identifier' );"><acronym class="uttInitialism">SSID</acronym></span> as an alternate connection method until I&#8217;m sure I have everyone switched over to the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'A server used for authenticating users against a central server. Can be used for dial-in users, VPN, wireless (802.1x) and other uses. (&lt;a href=&quot;http://en.wikipedia.org/wiki/RADIUS&quot;&gt;link&lt;/a&gt;)','caption', ' 	Remote Access Dial-In User Server' );"><acronym class="uttInitialism">RADIUS</acronym></span>-based <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Very basically, the string that shows up as the &quot;network name&quot; in an 802.11x wireless network. (&lt;a href=&quot;http://en.wikipedia.org/wiki/SSID&quot;&gt;link&lt;/a&gt;)','caption', 'Service Set Identifier' );"><acronym class="uttInitialism">SSID</acronym></span>.  But once I deactivate the <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'A standard used to encrypt and authenticate wireless network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&quot;&gt;link&lt;/a&gt;)','caption', 'Wi-Fi Protected Access' );"><acronym class="uttAbbreviation">WPA</acronym></span>-PSK network, security should go up because now you can&#8217;t just share the <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'WPA-PSK, also known as WPA Personal, this wireless network security setting uses a single key shared among clients and base station for authentication and encryption of network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/WPA-PSK&quot;&gt;link&lt;/a&gt;)','caption', 'Pre-Shared Key' );"><acronym class="uttAbbreviation">PSK</acronym></span> key, which has a way of getting out no matter how hard you try and protect it (having free wi-fi now helps this as well, since if someone just wants internet access, they don&#8217;t need the internal network key!).  And your keys get changed every time your passwords change, rather than coordinating updating the <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'WPA-PSK, also known as WPA Personal, this wireless network security setting uses a single key shared among clients and base station for authentication and encryption of network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/WPA-PSK&quot;&gt;link&lt;/a&gt;)','caption', 'Pre-Shared Key' );"><acronym class="uttAbbreviation">PSK</acronym></span> and then making sure everyone needing wireless access has the new key (if they don&#8217;t, expect cell phone calls asking for it pretty quickly).</p>
<p>That&#8217;s the high level why and how. I sleep now :-)</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/05/18/wireless-8021x-authentication-overview/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Initially Evaluating SmoothWall Guardian for Content Filtering</title>
		<link>/2007/05/12/initially-evaluating-smoothwall-guardian-for-content-filtering/</link>
					<comments>/2007/05/12/initially-evaluating-smoothwall-guardian-for-content-filtering/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Sun, 13 May 2007 03:34:14 +0000</pubDate>
				<category><![CDATA[Content Filtering]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Web]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/05/12/initially-evaluating-smoothwall-guardian-for-content-filtering/</guid>

					<description><![CDATA[We just released our Free Wi-Fi without much hurrah this week(end) (I&#8217;m out of town, so I hope no one needs help!). The big test will be Monday and Tuesday (when I will be in town) with us hosting our Indiana District Council. Right now, content filtering on the public wireless is being provided by [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>We just released our <a href="http://www.lakeviewchurch.org/wifiportal/" title="Lakeview Free Wi-Fi">Free Wi-Fi</a> without much hurrah this week(end) (I&#8217;m out of town, so I hope no one needs help!).  The big test will be Monday and Tuesday (when I will be in town) with us hosting our Indiana District Council.</p>
<p>Right now, content filtering on the public wireless is being provided by <a href="http://www.scrubit.com/" title="ScrubIT homepage">ScrubIT</a>, a free DNS-based filtering service.  Not bad but not as much control or information as I want; it&#8217;s a temporary solution (and I haven&#8217;t been given an account at ScrubIT yet, so I have no control at all).   Matthew Irvine has a <a href="http://www.matthewirvine.com/2007/04/22/protecting-your-network-from-outside-invaders/" title="techlesia: Protecting your network from outside invaders">couple</a> of <a href="http://www.matthewirvine.com/2007/04/23/protecting-young-and-not-so-young-eyes/" title="techlesia: Protecting young (and not so young) eyes">excellent</a> posts on his new blog, <a href="http://www.matthewirvine.com/" title="techlesia">techlesia</a>, talking about the open source <a href="http://www.smoothwall.org/" title="SmoothWall Express homepage">SmoothWall Express</a> firewall and <a href="http://dansguardian.org/" title="DansGuardian homepage">DansGuardian</a> content filter.  I have a bit of Linux experience, dabbling at best, but not anything extensive enough for me to set up DansGuardian on a production machine, although I might play with it virtually (SmoothWall Express, if we needed a firewall, might be an option since it is plug-and-play, but we already have <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> 2004).  The company <a href="http://www.smoothwall.net/" title="SmoothWall commercial homepage">SmoothWall</a> has a commercial version of both products, with the content filter called <a href="http://smoothwall.net/products/corporateguardian5/" title="SmoothWall Corporate Guardian">Corporate Guardian</a>, and from the preliminary pricing I&#8217;ve found it appears to be much, much less expensive than most of the commercial filtering boxes I&#8217;ve researched so far, which translates into &#8220;actually affordable.&#8221;</p>
<p>I think the Corporate Guardian looks the most promising, since they turn DansGuardian into a commercially-supported product, with the main benefit being that it&#8217;s plug-and-play, in addition to blacklist and updates subscriptions.  Everyone wins.  However, their <a href="http://smoothwall.net/products/evaluation-terms.php" title="SmoothWall Corporate Guardian Evaluation Terms">evaluation terms</a> concern me a bit.  The terms state, in part, &#8220;You may not communicate the results of your evaluation with other companies, organizations or persons not employed by your company or organization, unless this has been agreed in writing beforehand with SmoothWall.&#8221;  They also state that after the evaluation, you will &#8220;Not make public any notes, analyses, computations, studies or other documents prepared as part of this evaluation unless this has been agreed in writing beforehand with SmoothWall.&#8221;</p>
<p>Why does this concern me?  Well, I want to share my findings with you on this blog, and these terms say I have to get their permission first.  This seems to run counter to the company&#8217;s open source products philosophy, and makes me think they are scared of how their product compares to other similar products if someone were to write a review on their blog, for instance.  Sure, I could ask for permission to write a review, but if it&#8217;s not positive, why would they let me post it?  They can do what they want, but I&#8217;m not very happy with these particular terms and I&#8217;m seriously debating whether or not it&#8217;s worth giving up my ability to comment on my findings in order to evaluate the software beyond the claims they make on their website.  Is anyone else using SmoothWall&#8217;s commercial products, and if so, are you limited in your ability to comment on your company&#8217;s use of the products similar to the terms of the evaluation terms, or does that clause go away after you&#8217;ve made the purchase?</p>
<p>Thanks Matthew for getting me started on this particular content filter!  If I can get past the terms above I&#8217;m willing to give it a shot and maybe save some serious money in the process.  Or I may find that the open source versions are functional enough and easy enough to set up for my needs; now I just have to find the time to test it.</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/05/12/initially-evaluating-smoothwall-guardian-for-content-filtering/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>802.1x Port-based Authentication</title>
		<link>/2007/05/08/8021x-port-based-authentication/</link>
					<comments>/2007/05/08/8021x-port-based-authentication/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Wed, 09 May 2007 02:04:49 +0000</pubDate>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/05/08/8021x-port-based-authentication/</guid>

					<description><![CDATA[Is anyone else using 802.1x for wired authentication? I&#8217;ve got it working for wireless networking, which is pretty cool. But what about wired ports? I don&#8217;t necessarily want to go to the trouble of locking down every port on campus with 802.1x. Or do I? But public ports are what worry me. For now, the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Is anyone else using 802.1x for wired authentication? I&#8217;ve got it working for wireless networking, which is pretty cool.  But what about wired ports?  I don&#8217;t necessarily want to go to the trouble of locking down every port on campus with 802.1x.  Or do I?  But public ports are what worry me.  For now, the only wired ports in public areas are either physically unplugged at the rack (since they&#8217;re mostly brand new), hooked up to the public wi-fi VLAN so you could get free internet access just as if you had wi-fi, or locked down with port security to only the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'The unique address assigned to every network card. (&lt;a href=&quot;http://en.wikipedia.org/wiki/MAC_address&quot;&gt;link&lt;/a&gt;)','caption', 'Media Access Control' );"><acronym class="uttInitialism">MAC</acronym></span> addresses of the authorized equipment that&#8217;s already installed.</p>
<p>But, with 802.1x, there&#8217;s the possibility of making the ports automatically members of the public VLAN for free access.  But when a computer connects that can authenticate via 802.1x, it can bump them onto the employee VLAN.  Sweet.  But I need to do some manual-reading and testing on our ProCurve switches.  Is it worth the effort?  Is the Windows XP SP2 802.1x supplicant good enough, or would we need to pay for a third party supplicant?  I&#8217;ve noticed that for wireless, the Windows 802.1x supplicant seems to be much better that it was originally, and most laptops are coming with even better software built-in from the manufacturer.  A year or two ago, I wouldn&#8217;t implement an 802.1x-based network with the Windows XP client if you paid me.  Well, depends on how much, but it would hurt anyway&#8230;</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/05/08/8021x-port-based-authentication/feed/</wfw:commentRss>
			<slash:comments>11</slash:comments>
		
		
			</item>
		<item>
		<title>This is Why I Externally Host DNS</title>
		<link>/2007/04/14/this-is-why-i-externally-host-dns/</link>
					<comments>/2007/04/14/this-is-why-i-externally-host-dns/#respond</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Sun, 15 Apr 2007 02:44:30 +0000</pubDate>
				<category><![CDATA[Cool Services]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/04/14/this-is-why-i-externally-host-dns/</guid>

					<description><![CDATA[The SANS Internet Storm Center has been tracking a 0-day exploit out there compromising Windows DNS servers that are live on the Internet. I&#8217;d say this is a good reason to use Linux for such services, but that&#8217;s an argument for another day; there have certainly been DNS exploits on Linux DNS server software as [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The <a href="http://isc.sans.org/" title="SANS ISC homepage">SANS Internet Storm Center</a> has been tracking a 0-day exploit out there <a href="http://isc.sans.org/diary.html?storyid=2633" title="More info on the Windows DNS RPC interface vulnerability">compromising Windows DNS servers</a> that are live on the Internet.  I&#8217;d say this is a good reason to use Linux for such services, but that&#8217;s an argument for another day; there have certainly been DNS exploits on Linux DNS server software as well!  But at Lakeview, we use an external service (in our case, <a href="http://www.dnsmadeeasy.com/" title="DNS Made Easy homepage">DNS Made Easy</a>) to host our DNS.  They get to worry about it, fix it, keep the patches current&#8230;all we have to do is run our internal Windows Active Directory DNS services for our internal network, with recursive queries for outside domains.  But our internal servers aren&#8217;t open to the internet. That way, as few ports as possible are open from the outside in.  <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> and Exchange services (<span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Exchange\'s version of webmail','caption', 'Outlook Web Access' );"><acronym class="uttInitialism">OWA</acronym></span>, ActiveSync, <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'HTTP protocol using SSL encryption','caption', 'HyperText Transfer Protocol Secure' );"><acronym class="uttInitialism">HTTPS</acronym></span> over <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Remote Procedure Call' );"><acronym class="uttInitialism">RPC</acronym></span>) are the only things open that I can think of off the top of my head (the fact that I&#8217;m not sure of all these means I need to double-check next week!) that are open from the outside, and those are published through our Microsoft <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> 2004 firewall, which inspects all this traffic to make sure it&#8217;s properly formed before letting it in as another security measure.</p>
<p>We&#8217;re even protected from external <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Simple Mail Transfer Protocol' );"><acronym class="uttAbbreviation">SMTP</acronym></span> exploits against our Exchange server, because we use <a href="http://www.emailthreatcenter.com/" title="DefenderSoft Email Threat Center homepage">DefenderSoft Email Threat Center</a> (an <a href="http://www.mxlogic.com/" title="MXLogic homepage">MXLogic</a> reseller) to accept our incoming (and outgoing, for that matter) email.  Our Exchange server&#8217;s <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Simple Mail Transfer Protocol' );"><acronym class="uttAbbreviation">SMTP</acronym></span> service can only accept connections from their email servers, and nowhere else, so it&#8217;s not truly open to exploit, since external servers can only get to us through them.  This cuts down on spam as well (which could otherwise come through to our server, bypassing the spam filtering), which is a good side benefit.</p>
<p>If you don&#8217;t already keep your firewall locked down as tight as possible, keep your eye on the SANS <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Internet Storm Center' );"><acronym class="uttInitialism">ISC</acronym></span> for a while.  It&#8217;ll scare some sense into you :-)</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/04/14/this-is-why-i-externally-host-dns/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Public Computer Lockdown and Fortres Grand</title>
		<link>/2007/04/13/public-computer-lockdown-and-fortres-grand/</link>
					<comments>/2007/04/13/public-computer-lockdown-and-fortres-grand/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Fri, 13 Apr 2007 20:24:42 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/04/13/public-computer-lockdown-and-fortres-grand/</guid>

					<description><![CDATA[At the end of last month, I posted about locking down the public computers in our new youth lobby. I&#8217;ve found a new possible software solution, that seems to be comparable to Faronics DeepFreeze in some respects, but may have some additional useful features. This one is from a company called Fortres Grand and there [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>At the end of last month, I posted about <a href="http://infotech.davidszpunar.com/2007/03/23/public-computer-lockdown-options/" title="This Blog: Public Computer Lockdown Options">locking down the public computers</a> in our new youth lobby.  I&#8217;ve found a new possible software solution, that seems to be comparable to <a href="http://www.faronics.com/html/deepfreeze.asp" title="Faronics DeepFreeze product page">Faronics DeepFreeze</a> in some respects, but may have some additional useful features.  This one is from a company called <a href="http://www.fortresgrand.com/" title="Fortres Grand Corporation homepage">Fortres Grand</a> and there are three different pieces of software that might be useful in some combination:</p>
<ul>
<li><a href="http://www.fortresgrand.com/products/cls/cls.htm" title="Fortres Grand: Clean Slate"><strong>Clean Slate</strong></a><br />
This appears to be comparable to Deep Freeze in its function, but from what I&#8217;ve read it gives you more flexibility about not having to lose all changes on reboot if you&#8217;re an administrator, rather than having to reboot to &#8220;unlock&#8221; the computer and then make changes that you want to keep. Fortres Grand also claims that Clean Slate will allow Windows Updates and anti-virus signatures to be updated while in a &#8220;locked-down&#8221; state, persisting across reboots.</li>
<li><a href="http://www.fortresgrand.com/products/f101/f101.htm" title="Fortres Grand: Fortres 101"><strong>Fortres 101</strong></a><br />
Rather than allowing all changes and discarding most of them during a reboot, Fortres 101 instead locks down the computer from having certain items changed in the first place.  This would appear to be a complement to Clean Slate above if run together, but I don&#8217;t see an indication of whether this is a supported configuration on their site.  I can see the benefits to this where a user might change the wallpaper to something inappropriate; with Deep Freeze or Clean Slate it would be there until a restart, but with Fortres 101 it could be prevented in the first place.</li>
<li><strong><a href="http://www.fortresgrand.com/products/tlm/tlm.htm" title="Fortres Grand: Time Limit Manager">Time Limit Manager (TLM)</a></strong><br />
Fortres is promoting this heavily to libraries on their product pages, but I can see how it might be useful to us as well.  It would keep students from using the computers for an extended period of time, displaying a countdown and enforcing log off at a certain time.  That may not be enough reason to purchase it in and of itself, but I do like the ability to remotely view screen captures of what users are currently doing, see which computers are actively in use, and even send messages to users if needed to warn them about certain content or behavior.  I also like the usage history logs and the auto-shutoff at the end of the day.  It also integrates with Clean Slate to clear all traces of the prior user when a user logs off!  My concerns are that we&#8217;d need to buy a printer for the &#8220;reservation tickets&#8221; and also that the solution might be overkill for our current setup, although the clear-prior-user functionality integrated with Clean Slate may make it a worthwhile solution.</li>
</ul>
<p>This is just my first impression of this company&#8217;s programs.  They offer demo versions of all three, and when time allows I will likely grab them and try them out now that the computers for this purpose have arrived.  I still need to unbox and set them up, which will likely happen next week at some point.  Fortres also offers a <a href="http://www.fortresgrand.com/products/cc/cc.htm" title="Fortres Grand: Central Control">Central Control </a>product to control their Fortres 101 and Clean Slate software remotely, which looks promising but is also probably overkill for our environment.  Unlike Deep Freeze, which must be the Enterprise version to support central management, this solution appears to be an add-on purchase that we could buy down the road when we expand.</p>
<p>Do any readers have any past experience with Fortres Grand software to share?</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/04/13/public-computer-lockdown-and-fortres-grand/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>Public Computer Lockdown Options</title>
		<link>/2007/03/23/public-computer-lockdown-options/</link>
					<comments>/2007/03/23/public-computer-lockdown-options/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Fri, 23 Mar 2007 18:56:41 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/03/23/public-computer-lockdown-options/</guid>

					<description><![CDATA[We are placing four computers in our new youth facility for web browsing, homework help, etc., and I&#8217;m looking at options for securing the computers.Â  The software I know of (but have never used) is called Faronics DeepFreeze.Â  I thought I heard about a better alternative to this software on the Casting From the Server [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>We are placing four computers in our new youth facility for web browsing, homework help, etc., and I&#8217;m looking at options for securing the computers.Â  The software I know of (but have never used) is called <a href="http://www.faronics.com/" title="Faronics.com">Faronics DeepFreeze</a>.Â  I thought I heard about a better alternative to this software on the <a href="http://www.castingfromtheserverroom.com/" title="Casting From the Server Room podcast">Casting From the Server Room</a> podcast last Fall, but I can&#8217;t seem to locate that information.Â  I&#8217;m not sure if this is even the best way to lock down the systems.Â  I&#8217;ve considered lock-down via Group Policy, which I&#8217;ve done before and may still do to limit actual actions on the computer, but it&#8217;s not foolproof and it takes a lot of detail to lock down &#8220;just enough&#8221; but not &#8220;too much.&#8221;Â  And I don&#8217;t necessarily want these systems joined to the domain, either.</p>
<p>Any options anyone has successfully used to implement this functionality?Â  Anything I should be aware of or stay away from?Â  I&#8217;ve considered using thin clients and a terminal server, but I don&#8217;t have the time to research cost comparisons (computer and support cost vs. server cost&#8230;I may be getting some thin clients for free soon and if so, I have plenty of other uses for them anyway) and such (will audio work, will all possible future applications run in Terminal Services, and so on).Â  I&#8217;m probably going to grab some off-lease IBM NetVista machines for about $275 and add some RAM.</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/03/23/public-computer-lockdown-options/feed/</wfw:commentRss>
			<slash:comments>13</slash:comments>
		
		
			</item>
		<item>
		<title>Hardware Inventory and/or System History and Tickets</title>
		<link>/2007/03/16/hardware-inventory-andor-system-history-and-tickets/</link>
					<comments>/2007/03/16/hardware-inventory-andor-system-history-and-tickets/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Fri, 16 Mar 2007 17:17:09 +0000</pubDate>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Help Desk]]></category>
		<category><![CDATA[Inventory]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/03/16/hardware-inventory-andor-system-history-and-tickets/</guid>

					<description><![CDATA[I have a problem. Hardware hasn&#8217;t really been tracked here before, and I&#8217;d like to start doing that. At least at the level of desktop and/or LCD monitor, the two most costly and most likely to be &#8220;lost&#8221; items. I&#8217;ve never really found a solution for this that I like. For one, I like free, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>I have a problem.  Hardware hasn&#8217;t really been tracked here before, and I&#8217;d like to start doing that.  At least at the level of desktop and/or LCD monitor, the two most costly and most likely to be &#8220;lost&#8221; items.  I&#8217;ve never really found a solution for this that I like.  For one, I like free, and I haven&#8217;t found a free option.  I&#8217;ve tried <a href="http://www.spiceworks.com/" title="Spiceworks free computer network inventory tracking">Spiceworks</a>, which is an excellent program, but I&#8217;ve run into enough issues with getting all machines entered in and tracking exceptions manually that it&#8217;s not a total solution.  I&#8217;ve started making notes about new systems in an encrypted OneNote 2007 notebook, which does keep track of information well and is a good memory jog, but unless I create some templates (which are easy to create in OneNote), the information fields will vary, and it doesn&#8217;t fit the idea of a centralized store that I would prefer, although right now it&#8217;s just me.  We&#8217;re working on our IT volunteer program, though, and I&#8217;d like whatever ends up being the final solution to scale well and function as a central repository.  Trouble ticket tracking would be a good bonus, or at least a &#8220;system history&#8221; where a log of changes or issues encountered on each system can be centrally stored and associated with the system and/or user.</p>
<p>I&#8217;ve considered a Wiki, which is still an option, but other than the lack of being web-based and multi-user accessible, I like OneNote&#8217;s UI better and it seems similar.  Did I mention easy-to-use and flexible is my number one requirement?</p>
<p>I&#8217;m still without a good, long-term solution.</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/03/16/hardware-inventory-andor-system-history-and-tickets/feed/</wfw:commentRss>
			<slash:comments>7</slash:comments>
		
		
			</item>
	</channel>
</rss>
