Friday, February 29, 2008

[TIPS] Stop what you're doing and watch this!

http://www.ted.com/talks/view/id/224

This will change EVERYTHING we know about our life in our solar system. It will change the way our earth and space teachers teach. This is... almost beyond words in its leap into the future and what it does for our understanding of the universe. Here is the descriptive paragraph from the Ted site itself:

"Science educator Roy Gould and Microsoft's Curtis Wong give an astonishing sneak preview of Microsoft's new WorldWide Telescope -- a technology that combines feeds from satellites and telescopes all over the world and the heavens, and weaves them together holistically to build a comprehensive view of our universe. (Yes, it's the technology that made Robert Scoble cry.)" (http://scobleizer.com/2008/02/27/what-made-me-cry-microsofts-world-wide-telescope/)

And that paragraph doesn't do it justice. This will be available this spring. It'll be free at http://worldwidetelescope.org

Send this to every science teacher you know. Oh, my suggestion is that you download the video to watch it, rather than try to stream it.

Oh my... SO VERY MUCH to learn. Imagine the kids who are going into second or third grade next year and how they will come to learn about the universe.

And I thought I felt insignificant just looking at our own Milky Way!

More spelling and grammar information from Word

I doubt many people do not make use the spellchecking facility in MS Word. Most people probably run a grammar check too. Nevertheless, few people will use Word's readability statistics report.

To switch this report on, open the 'Tools' menu in Word and click on 'Options', select the 'Spelling & Grammar' tab, tick the 'Show Readability Statistics' box, and click 'OK'.


Now, when you click on the 'Spelling and Grammar' button (shown left), Word will go through any errors it finds in the selected text, or the whole text if none is selected, and then it will show you the 'Readability Statistics' report.


This report is particularly useful to anyone who wishes to make their writing more legible. The report not only contains general information about the number of words, characters and sentences etc, but also the average number of sentences per paragraph, words per sentence and the like.

The bottom section includes three very useful measures. The first gives a percentage of the number of passive sentences in the selected text. As you may know, the active voice makes a text more readable, so it is best to avoid the passive voice when possible. There is a good tutorial about the difference between the voices here.

The second and third measures, the Flesch reading ease and the Flesch-Kincaid grade level, show how difficult a text is to comprehend according to mathematical equations. More details on these equations and an explanation of the scales are available here.

[TIPS] Open PD

http://drapestakes.blogspot.com/2008/02/openpd-what-why.html

 

Darren Drapper (The guy behind the “Paying Attention” video) has been conducting Open Professional Development sessions for some time. He uses the social tools to teach ABOUT the social tools and it’s been an amazing success, with people from around the world tuning in to participate.

 

That link includes a video he just released that talks about this efforts and includes clips from those who have been participating.

 

Something to think about… we’ve got the tools to collaborate and learn ANYTIME and ANYWHERE. When we think about education in 100 years will it be some form of this model?

Thursday, February 28, 2008

[TIPS] Google going wiki?

This just in... http://www.ncs-tech.org/?p=1170

Two things about this post. First, there's the google sites news itself. This looks incredible! Note the google pages site - this is... well, read Jarrett's post and then go check it out for yourself.

The second thing about this is how I first heard about it. I went to Twitter to find someone to ask a question and I read his "tweet" about this post.

Y' gotta luv it!!!

Wednesday, February 27, 2008

[TIPS] Another GREAT assignment

I’m a lucky man – for many reasons. But one reason is that I’ve been lucky enough to have found some excellent blogs written by some excellent educators. I’ve written about Anne Smith before. I won’t bother linking to all the posts I’m written that mentioned her and her students. But, here’s another great assignment that she gave to her students.

 

http://learningandlaptops.blogspot.com/2008/02/self-portraits.html

 

English teachers, take note of this one. I’d LOVE to hear what you think about it. Send it along to your favorite English teacher. I think they’ll appreciate the thought.

 

Anne’s post also pointed me to another teacher’s blog and I really enjoyed this post: http://21cgaffney.blogspot.com/2008/02/my-guilty-conscience.html

 

See what you think.

 

LiveScribe Pulse Smartpen-Language Translation

I have made several posts about the LiveScribe Pulse Smartpen and can't wait to get my hands on it. The LiveScribe Pulse Smartpen is a new computing platform with tremendous promise. In the video link you can see the Pulse Smartpen in action as it translates from English to Spanish, English to Mandarin, and English to Arabic. It is really exciting to see the Pulse Smartpen in action. Just think of the power and the application that this computing platform has to offer.

[TIPS] would YOU fall for this?

You get a phone call from a man with a heavy Indian accent. He says that he accidentally withdrew $480 from your account and he’s SO VERY sorry. But, the honest chap will gladly put it back. All he needs to make it happen is your bank account number.

 

PLEASE tell me that you wouldn’t fall for that. NO WAY, right?

 

Well, give this a listen. http://consumerist.com/360921/man-records-phishing-call It’s almost 9 minutes, but you’ll get the idea after just a couple, I’m sure.

 

YOU may be smart enough to avoid these scams, but your son or daughter or parent who is new to the web may NOT be. PLEASE have “The Talk” with them. Tell them that even if it IS true that they got your money, it’s cheaper to let them have it than to risk divulging your account number.

Show Branch Alone in MindManager 7

There are times when you have developed a rather complex MindManager 7 map, that all you want to do is just focus in and isolate that branch so that you can attend to the information that is on that topic. The Show Branch Alone command is a great feature which lets you do just that. All you need to do is click on the Topic and go to the View Menu and select Show Branch Alone. You can accomplish the same thing by Pressing the F4 key. The F4 key when you have a Topic selected toggles between Show Branch Alone and Show Other Branches. I have created a short screencast in Camatasia Studio 5 to show you how it works.

Xdrive -Free 5GB of Online Storage

If you are looking to store your files on-line you may want to take a look at Xdrive which will provide you with a free 5GB account. Xdrive announced the release of the Xdrive Desktop Lite client that has been developed using Adobe Air, which once installed lets you drag files from your desktop or USB drive right into your Xdrive account. I installed the Xdrive Desktop Client today and it worked like a charm. Within minutes I was able to drag my files and have them stored on-line. By setting permissions for files you can easily share files with friends and family. Once your files are stored you can access them with any computer with any internet connection. Give it a try! If you need more space you can subscribe for premium storage plans that start at $9.95 a month for 50GB of storage.

CoverItLive blogging session

OK. Karl can't have all the fun. I just HAVE to try this! So, On Tuesday morning at 9:00 I'll be giving a 45 minute presentation to about 175 science teachers in the area. The topic will be on the need for change, and what the change might look like, etc. At one point in the talk I mention CoverItlive. Now that I've actually seen in I'd like to try it.

I'll have a guest author assigned to my blog who will take notes and moderate the coveritlive chats, making them public when appropriate. We'll just have to see how it works with the filter. It may end being a total flop - which is why I'm not telling anyone but you. ;-)

So, come back here on Tuesday if you'd like to try this out with us. Who knows, someone may even hold an audio skype call so others can hear, too. But, the important thing here is to see how this works.

This is where it will be. Want a reminder? Fill in the form there. Y' gotta LUV it!

The 2nd Carnival of Computer Help and Advice

Firstly, let me thank everyone who submitted an article for inclusion on this carnival. I received forty-eight submissions and I am sorry that I could not include them all.

Getting us started this month, Ashutosh Mishra presents an article containing fourteen tips for making Windows run faster in Speed Up Your Computer at PC TON!C. In a similar vein Jose DeJesus MD gives advice for Tuning up Windows on his Physician Entrepreneur blog. Jose also identifies a common problem and a software solution for it in his article, Renaming All those Files Your Camera Makes.

While we are on the subject of software, "Here's a very useful free pdf download for you" says Andrew Edgington of Learn Photoshop Now with reference to Getting Started With Photoshop - Volume 1 and Volume 2. Nesher at Freeware Reviews wrote two excellent freeware round-up articles: the first a list of 18 Free Password Managers, the second 17 Free Utilities for PDF Files Reading. For the network analysts out there, Nim at dixlinx presents a review article of Wireshark - network protocol analyzer (packet sniffer) , which includes a useful video tutorial of the software in action. In the last software based article for this carnival, Steven Stoddard of Steve's Tech Guide tells you how to Secure Your Computer and Network With Free Software.

Steve's guide may be of use for those who answer 'yes' to jsanderz' question, Could Your Computer be Infected With a Virus? that was posed at Information Addicts. Similarly Aa'ed Alqarta offers the first part of an article advising on how to Analyze Malware-infections on your own – Part I at Extreme Security -- Do It Securely or Not at all!. The Emperor at The Tech Empire presents a way of getting past a problem that can result from a viral infection in his article Can't get to the Control Panel, Task Manager, or Registry Editor?.

Even without viral infections and malware wreaking havoc we can cause problems on our own computers. Accidentally deleting files is one such mistake, thankfully andyar85 at PC issues - DIY offers help in his article Retrieve deleted information from hard-drives. In his article HDD cloning/image backup, Andy also offers advice on (in his own words) "the best way to reinstall/install an operating system is to use the old one you are still running. Try these methods, you won't regret it." Prash also looks at operating systems in an article on his blog in an article in which he pits ubuntu vs windows.

Two 'look and feel' tips to round off this edition of the carnival, Shaswata Mukherjee shows us what to do if we Want to change windows to your name at Cool Computers Tricks and Tips, and James Lewitzke presents 5 Ways to Enhance Your Web Browsing Experience at Lightning Shock. James tells us "these tips are what I use to have a great online experience."

On that note, I hope this issue of the Carnival of Computer Help and Advice was also a great online experience. More next month.

p.s. If you would like to host the next carnival leave a comment on this post or use the contact form over at our Blog Carnival page. Cheers, K.

Monday, February 25, 2008

Starting Out in Computer Support Jobs

When you are starting out as a consultant looking to get involved with computer support jobs, you might only have basic desktop support level tech skills. But you have to make sure you get paying clients – computer support jobs that fit your current tech skills comfort level. Which clients should you pursue first?

You need to start out working with home offices and small stand-alone businesses and companies with very small peer-to-peer simple networks. This way you will get some paying clients as well as reference accounts.

One-Shot Deals Can Lead to Better Computer Support Jobs

Even if you start out by doing one-shot deals, you have to go beyond. Your business will be successful when it is built on recurring revenue that comes from retainer agreements and very complex dedicated server solutions. When you are starting out in the process of getting computer support jobs you can take on smaller accounts. But you are going to have to move towards more complex, more profitable and long-term clients.

Keep up the Learning Process to get More Computer Support Jobs

If you think your lack of tech training is keeping you from clients that need a lot more from you, you should save some time each week for training, even if it is only just two or three hours worth. You can look at tutorials and resource kits and also install the not-for-resale (NFR) software and break the installation so you can continue to practice the setup.

Added By: Joshua Feinberg

Windows Folder Options Explained (Part 4)

Continued from part 3...

File Types
This tab contains a list of all the file types that Windows knows about and which programs are configured to open them if you double-click on their icons.


As the image shows, if a .doc document is double-clicked on it will open in MS Word. You can change the program that is associated with a file type by selecting its entry and pressing the 'Change...' button.

Occasionally you might want to delete file types from the list, if you do not use files of a certain type any more. Highlight the entry for the file type and press the 'Delete' button. This will reduce the size of the Registry (a file that contains most of the settings for Windows and other applications), but not by enough to have a significant impact on performance. So, the chances are that you will probably want to leave this list alone.

There is an option to create a new file type for the list, using the 'New' button, but frankly, you are better off just double clicking on a file of the new type and selecting a program to associate it with in the normal way.

Finally there is an 'Advanced' button, which is used to change the way that Windows creates, opens, and prints files of the selected type. It would be best to leave these settings alone unless you know what you are doing, and an explanation of these settings is beyond the scope of this series of articles.

Some versions of Windows will have a fourth tab in the Folder Options dialog box, called 'Offline Files'. This will not be covered within this series of articles as this would require me dealing with the larger issue of folder synchronisation. Something that I may return to in the future.

Sunday, February 24, 2008

Fix Central: A central place to get your Informix fixes

In this article I'll cover one of the sites that IBM uses to improve it's interaction with customers. As many Informix customers know, traditionally we would only have access to the normal releases.
Theese would be like IDS 10.00.FC8, or CSDK 3.00.TC1 etc.
I won't go into details explaining the meaning of all the release code fields, but you probably know that any two letters and one numeric digit following major and minor versions (FC8 and TC1 in the examples) mean that this is a standard, generally available release level (internally called Interim Release). It includes mainly code fixes, but can also include some new features and they are cumulative (FC8 should include all the corrections and features that went into FC7).

But, if you ever hit a bug and contacted support, then you probably ended up with a patch level like 10.00.FC7X5 or 11.10.FC2W1. These have special meanings... The "X" letter, followed by a numeric digit means this is a special build, generated from a customer request, and it includes one or more bug fixes. It is not cumulative, meaning X2 may have a completely disjunct set of fixes from X1 and also X1 on one platform may have nothing in common with X1 on another platform.
"W" means it's a Post Interim Drop (PID). These were introduced a few years ago, and they are build for the major platforms. These release levels include a set of fixes (no new features) and are made from time to time. They are cumulative, meaning all W1 fixes will be included in W2 (unless the fix itself has problems and has to be removed).
The idea behind all this is that the customer should not have to wait for the next commercial interim release to get a product fix, if he hits a bug.

Until June 2007, you would have to open a support case before you could have access to one of this special builds. Then your support engineer would give you specific instructions on how to download the fix from a temporary location (or you could receive the fix by mail if you prefer).
Since that date, IBM made available many of these fixes in a new system or web site, called the Fix Central.
You will need a valid ibm.com account, associated to a valid Passport Advantage customer account. Then, assuming your PA account entitles you to use the specific version you will have access to some of these fix releases.
This makes the interaction between customers and IBM technical support easier, and it also gives the ability for a customer to access and test the most recent releases by himself. If you fill you're hitting a bug, and after searching the support site you find an APAR (Authorized Program Analysis Report) that matches it, you may search for a fix that solves it in the Fix Central site.
The searches can be made by product family, APAR, release level and platform. So this means you have a lot of flexibility and ease of use.

I'll end this post with some references where you can get more details about all these:

Saturday, February 23, 2008

Windows Folder Options Explained (Part 3)

Continued from part 2...

View Settings continued


Hide protected operating system files (Recommended)
This option is selected by default, to protect users from themselves, as is explained in the warning message that appears if you try to switch it off.


If you click 'Yes' on this dialog box you will be able to see these special system files. The image below shows various system files that are required by Windows to run, such as 'pagefile' which is the swap file which Windows users to manage memory. As the setting suggests, most users will want to leave this option selected.



Launch folder windows in a separate process
This setting, if selected, changes the way that Windows runs different instances of Explorer by running them in separate processes, so if one crashes the others should continue running. You may want to select this but according to user experience it seems to make little difference.


Managing pairs of Web pages and folders

This setting is made available when MS Office XP or 2003 is installed. It effects the way that web pages are saved by Internet Explorer: the default option - 'Show both parts and manage them individually' - saves the web page along with all the files it needs to operate in a folder and these can be manipulated like any other files; however, the other options 'Show and manage the pair as a single file' and 'Show both parts and manage as a single file' link the file and folder in such a way that if one is moved or deleted the other will be treated the same. The last of these options hides the folder which contains the associated files. This is a rather confusing option and is probably best left well alone.


Remember each folder's view settings
This setting is pretty self explanatory. If selected it will mean that each folder will retain whichever display options were applied the last time you accessed it in Explorer.


Restore previous folder windows at logon
If selected, this option will mean that Windows will open all the Explorer windows that you had open when you shut down or logged off your computer previously. Handy if you have to reboot a lot.


Show Control Panel in My Computer
Another self explanatory option. If selected the 'Control Panel' icon will be visible when you view 'My Computer' in Explorer.


Show encrypted or compressed NTFS files in color
NTFS is one of the file systems available in the various versions of Windows and is more feature-rich than the more common file system: FAT32. It includes the facility to compress files (like in zip files) in order to save hard drive space and the ability for the user to encrypt files so that other users will only see gibberish if they open them. If this option is selected the details about compressed files will be blue and those for encrypted files will be green.



Show pop-up description for folders and desktop items
If this option is turned off then the yellow pop-up descriptions that appear when the mouse pointer hovers over a file or folder, as shown below, will no longer appear.



Use simple file sharing (Recommended)
If you wish to have more control over the way that you share files and folders with other users on your network you can switch this option off. For the vast majority of users is inadvisable to change this option. If you have the need for different users to able to access different files you can use this option.

The last part of this series will explain the File Types tab.

Friday, February 22, 2008

[TIPS] another great Ted video

http://www.ted.com/talks/view/id/223

This one isn't about education or discovery or technology or about ANYTHING - except fun. These two jugglers are flat out amazing - and pure fun.

When you get a few minutes for yourself, watch it. I laughed out loud and even applauded.

Enjoy!

How To Steal Hard Disk's Data

Question:-How I can steal Data from A Hard Disk?
Answer:-Steal Data from Hard Disk

SAN FRANCISCO — A group led by a Princeton University computer security researcher has developed a simple method to steal encrypted information stored on computer hard disks.

The technique, which could undermine security software protecting critical data on computers, is as easy as chilling a computer memory chip with a blast of frigid air from a can of dust remover. Encryption software is widely used by companies and government agencies, notably in portable computers that are especially susceptible to theft.

The development, which was described on the group’s Web site Thursday, could also have implications for the protection of encrypted personal data from prosecutors.

The move, which cannot be carried out remotely, exploits a little-known vulnerability of the dynamic random access, or DRAM, chip. Those chips temporarily hold data, including the keys to modern data-scrambling algorithms. When the computer’s electrical power is shut off, the data, including the keys, is supposed to disappear.

In a technical paper that was published Thursday on the Web site of Princeton’s Center for Information Technology Policy, the group demonstrated that standard memory chips actually retain their data for seconds or even minutes after power is cut off.

When the chips were chilled using an inexpensive can of air, the data was frozen in place, permitting the researchers to easily read the keys — long strings of ones and zeros — out of the chip’s memory.

“Cool the chips in liquid nitrogen (-196 °C) and they hold their state for hours at least, without any power,” Edward W. Felten, a Princeton computer scientist, wrote in a Web posting. “Just put the chips back into a machine and you can read out their contents.”

The researchers used special pattern-recognition software of their own to identify security keys among the millions or even billions of pieces of data on the memory chip.

“We think this is pretty serious to the extent people are relying on file protection,” Mr. Felten said.

The team, which included five graduate students led by Mr. Felten and three independent technical experts, said they did not know if such an attack capability would compromise government computer information because details of how classified computer data is protected are not publicly available.

Officials at the Department of Homeland Security, which paid for a portion of the research, did not return repeated calls for comment.

The researchers also said they had not explored disk encryption protection systems as now built into some commercial disk drives.

But they said they had proved that so-called Trusted Computing hardware, an industry standard approach that has been heralded as significantly increasing the security of modern personal computers, does not appear to stop the potential attacks.

A number of computer security experts said the research results were an indication that assertions of robust computer security should be regarded with caution.

“This is just another example of how things aren’t quite what they seem when people tell you things are secure,” said Peter Neumann, a security researcher at SRI International in Menlo Park, Calif.

The Princeton researchers wrote that they were able to compromise encrypted information stored using special utilities in the Windows, Macintosh and Linux operating systems.

Apple has had a FileVault disk encryption feature as an option in its OS X operating system since 2003. Microsoft added file encryption last year with BitLocker features in its Windows Vista operating system. The programs both use the federal government’s certified Advanced Encryption System algorithm to scramble data as it is read from and written to a computer hard disk. But both programs leave the keys in computer memory in an unencrypted form.

“The software world tends not to think about these issues,” said Matt Blaze, an associate professor of computer and information science at the University of Pennsylvania. “We tend to make assumptions about the hardware. When we find out that those assumptions are wrong, we’re in trouble.”

Both of the software publishers said they ship their operating systems with the file encryption turned off. It is then up to the customer to turn on the feature.

Executives of Microsoft said BitLocker has a range of protection options that they referred to as “good, better and best.”

Austin Wilson, director of Windows product management security at Microsoft, said the company recommended that BitLocker be used in some cases with additional hardware security. That might include either a special U.S.B. hardware key, or a secure identification card that generates an additional key string.

The Princeton researchers acknowledged that in these advanced modes, BitLocker encrypted data could not be accessed using the vulnerability they discovered.

An Apple spokeswoman said that the security of the FileVault system could also be enhanced by using a secure card to add to the strength of the key.

The researchers said they began exploring the utilities for vulnerabilities last fall after seeing a reference to the persistence of data in memory in a technical paper written by computer scientists at Stanford in 2005.

The Princeton group included Seth D. Schoen of the Electronic Frontier Foundation, William Paul of Wind River Systems and Jacob Appelbaum, an independent computer security researcher.

The issue of protecting information with disk encryption technology became prominent recently in a criminal case involving a Canadian citizen who late in 2006 was stopped by United States customs agents who said they had found child pornography on his computer.

When the agents tried to examine the machine later, they discovered that the data was protected by encryption. The suspect has refused to divulge his password. A federal agent testified in court that the only way to determine the password otherwise would be with a password guessing program, which could take years.

A federal magistrate ruled recently that forcing the suspect to disclose the password would be unconstitutional.

Windows Folder Options Explained (Part 2)

Continued from part 1....

View Settings
The 'View' tab has two sections. In the first section, 'Folder Views' you can either set Explorer to show all folders according to the current settings using the 'Apply to All Folders' button; or, by clicking the 'Reset All Folders' button, Explorer can be set to display folders as they were when Windows was first installed - this excludes any changes made to the toolbars.


The second section has a number of 'Advanced settings' to change the look and the behaviour of Explorer.


Automatically search for network folders and printer
If this setting is selected Explorer will hunt round the local network for any shared folders or printers. The effects of this setting will be negligible for home users or anyone who is not on a large local area network within a company or other organisation.


Display the size information in folder tips
If this setting is ticked, Explorer will show the size of the contents of a folder if you hover the mouse over it. As shown in this picture:



Display simple folder view in Explorer's Folders list
This setting affects the way that the folder view appears. You can show the folder view by clicking on the 'Folders' button on the toolbar.

The normal folder view looks like this:


The simple folder view looks like this (note that the dotted lines are not visible):


With the simple folders view option is selected when you select a folder in the list Explorer will automatically expand a list of all the sub-folders it contains and will collapse any other lists. If the normal view is selected any explanded lists will be left open when another folder is clicked.


Display the contents of system folders
A number of folders on Windows are classified as system folders, like the 'Windows' folder and the top level of the system drive (usually the 'C' drive). By default the content of these folders is hidden, and if you open them in explorer you will see the following:


If you click on 'Show the contents of this folder' you will then be able to see its contents, or alternatively if you select the 'Display the contents of system folders' option then the content of all system folders will be viewable.

Display the full path in the address bar
This setting shows the name of the current selected folder and the names of all the folders it is contained within in the address, like so:


From this we can see that the 'admin' folder is contained within the 'Documents and Settings' folder on the 'C' drive.

Ordinarily the address bar would only read 'admin'.


Display the full path in the title bar
This is much the same as the last setting, except that the full path can be shown in the title bar, as follows:



Do not cache thumbnails
You can change between various views within Explorer by using this drop down menu.

If thumbnail view is selected Explorer will display a small version of any images that the folder contains, as shown in the next image. If there are a lot of images in the folder, it may take Explorer a while to show them all, if this setting is selected. If it is not selected Explorer will create a small file in the folder which will contain the thumbnail information, meaning it only needs to read this file rather than make new thumbnails from all of the images in the folder.

If you are running low on hard drive space you may wish to recover the space taken by these files.


Hidden files and folder
Some files and folders are hidden from view by default and some can be hidden by choice. This setting can be used to make these files and folders visible. If 'Show hidden files and folders' is selected then all hidden files will be displayed as faded items, as shown here:

There are several hidden folders shown above including 'Application Data' and 'Local Settings', and a couple of hidden files, such as ntuser.dat.


Hide extensions for known file types
This option is selected by default, and as such all files will be displayed as follows:

I prefer to have Explorer show me the whole filename including the extension, which is the short code, usually three letters, at the end of the filename that lets Windows know what application to open it in.

If Windows has not been told what program to use when a file with a certain extension is double-clicked, it will show the extension anyway.

I will explain the remaining settings on the 'View' page in the next part of this series of articles.

Thursday, February 21, 2008

[TIPS] new library search tools

This one came to me in the "Neat New Stuff" mailing. Sign up for yourself at, http://marylaine.com/neatnew.html

- - -
http://www.collegedegree.com/library/college-life/25-awesome-beta

From the site:
"If you're tired of using the same old search box on your local library website for research projects, it might be time to broaden your horizons. Try out one of these in-the-works betas sponsored by world-class libraries around the world. From academic libraries like that at MIT or renowned research centers like the Library of Congress, the following beta research tools feature innovative tricks to connect you with the most relevant, valid results on the Internet and in their card catalogs. Melvil Dewey would be proud."

Cheetah 2: The cat is out for it's second open beta...

As the title suggests, IBM has just made available the IBM Informix Dynamic Server (IDS) 11.50 (codenamed Cheetah 2) for anyone wanting to test it. It's the second open beta of an IDS version (the first happened last year with 11.10 - Cheetah).

The process is a little bit more complex than the previous beta. This time you have to send and email requesting access. The system will provide you with an access code and you'll receive a copy of Carlton Doe's book on IDS 11.

Again IBM proves it's commitment to Informix technology and to it's customers, by providing a new release available in about 1 year.

This beta program includes a non-disclosure agreement and we cannot talk about it... But I'm sure as soon as the new features are announced we'll see a lot of articles about them, and I plan to cover some of them here in detail. For now, please check the release notes :)

So, in order to get hold of your copy, just go to http://www.ibm.com/informix/new and click on IDS 11.50 beta. As I mentioned above, the process will take longer than last time, but you'll receive your copy of Carlton's book.

Once again R&D has made a wonderful job in providing excellent new features. I'm curious to know for how long the competition will play the 'FUD' song to customers...

Windows Folder Options Explained (Part 1)

In the 'Tools' menu of any Explorer window there is a 'Folder Options' item. This opens a dialog box that enables us to change the behaviour and the look of Explorer windows. This series of articles explore these various settings. The first part will deal with the 'General' tab.

Note: This article refers to Windows Explorer, the in-built file manager program, not to Internet Explorer, the web browser.

General Settings
The 'General' page has three settings, and a 'Restore Defaults' button that you can press to return to Windows' original settings.


Tasks

The first setting, 'Tasks', can be used to either show or hide the left hand pane in Explorer windows. The default setting - 'Show common tasks in folders' -will make Explorer windows look like this:


Selecting 'Use Windows classic folders' will make the windows look like this:


Browse folders
This setting can be used to change the way that Explorer responds to a double-click on a folder. If you have 'Open each folder in the same window' set, when you double click on a folder icon the current Explorer window will show the contents of that folder. This is the default setting for more recent versions of Windows; older versions defaulted to the other setting - 'Open each folder in its own window'. If this is selected then a double click on a folder will result in a new window opening up showing the contents of that folder. All fairly self explanatory.

Click items as follows
You can change the way that Windows responds to clicks on icons with this setting. The default is 'Double-click to open an item (single-click to select)'; however, you can make Windows behave like a web browser, that is, it will open a file when you click on it once. To do this select 'Single-click to open an item (point to select)'. This has two sub-settings, which change the way that the icons appear. They will look like the following image all the time if the 'Underline icon titles consistent with my browser' option is elected, or only when you hover the mouse pointer over them if the 'Underline icon titles only when I point at them' option is selected.

I recommend that you leave this setting as default.

The next article will look at the first collection of the settings on the 'View' tab.

Wednesday, February 20, 2008

[TIPS] email no-no

For the fourth time this week I have received an email in which my name appeared - along with about 100 others - in the TO: field of the email. This is a DEFINITE no-no!

If you need to send an email to a lot of people there are lots of ways of doing that while still protecting their privacy. In the to: field, put your OWN email address, for example. Then, in the BCC (NOT the CC) field, put all the other addresses, That way nobody else will see all those addresses.

Have you ever received a forward from someone and  you've had to scroll down through several pages of headers that contained dozens and dozens of email addresses? Talk about a spammer's dream!

There is a website (that I've mentioned before) called ThanksNo (http://www.thanksno.com) that you might consider sending to the person who puts your email address in with all those others for all to see. The site does a nice - polite- job of telling the person what they did something wrong. It isn't quite as firm as I'd prefer, but it's a good start. So, simply reply to that person and include the address listed above. That way your own frustrations don't come out in the tone of your email when you reply to tell them to remove your name from their list if they're going to INSIST on ... er. well.. you see what I mean. :-)

This is NOT just a pleasantry. It's not a LAW, either. But, it IS proper email etiquette that everyone SHOULD abide.

Chuck Frey Has Posted the Results of Latest Survey

Chuck Frey has posted the latest results of the whats "Hot & Not" survey on his blog. I had a chance to read it and was surprised at some of the findings. If you have the chance take a look at the findings and let me know what you think.

February Mindjet Newsletter is Out

If you are a MindManager User then take a look at the just released Mindjet February Newsletter. You will notice that the newsletter has been totally redesigned with lots of great MindManager information and articles. You will find great maps and articles by Jamie Nast, Stephanie Diamond, and CJ Cornell. Each month I will contribute a video tip demonstrating how to do use one of the many MindManager features. The new Mindjet Newsletter not only looks greta but is chock full of great tips and information. Enjoy!

PS: Additionally, I am available to help your organization create video tutorials for in house training using state of the art screencasting software. If you look at my blog you will see some examples of the work that I have done using Camtasia Studio 5.

[TIPS] Schools blamed for society's ills?

http://www.coloradoan.com/apps/pbcs.dll/article?AID=/20080215/OPINION04/802150313

This is a brief article, but an interesting one. It's probably something that we've all been thinking - or maybe even saying to anyone who would listen. That is, NCLB is punishing schools for the problems of our society. Is there an achievement gap? Yes. Is it the fault of the schools? Read the brief article for one man's opinion.

Tuesday, February 19, 2008

IT Sales Copy to Get You Going

Effective IT sales copy is essential to any marketing plan. If you want to get customers to the next step, you need to get maximum impact with your copywriting.

If you create compelling text, long IT sales copy is fine; you can even have a letter that is several pages long and includes endorsements and testimonials. Just stay away from jargon and IT speak and focus on BUSNIESS, which is what your prospects will know.

You should also show with IT sales copy that your business guarantees satisfaction. Personalize your letter and create a common connection to make sure you are creating compelling reasons for prospects to get in touch.

Make Sure Your IT Sales Copy Gets Through

A lot of IT sales letters can end up in the garbage, because a lot of people read their mail near the garbage can. If your piece of mail is not eye catching, it will be trashed, and you will have wasted time and money.

You need to make sure part of your IT sales copy gives people multiple points of contact – fax, phone, Web site and e-mail address. You need to make sure prospects have options and can get in touch with you in the way they feel most comfortable.

Are You Creating a Sense of Urgency?

You need to set a deadline with your IT sales letter to create a real sense of urgency. If you don’t have a deadline, even if prospects ARE interested, they will file it away and forget about it.

Present a call to action or special offer that asks prospects to call before X date to book a free, no obligation security checkup or some other compelling free offer that is of value to them. Give prospects a reason to react to your IT sales campaign immediately!

Added By: Computer Consulting Kit

Andrew Wilcox Starts MindManager Blog


Noted MindManager User and Trainer Andrew Wilcox has started a blog focusing on MindManager solutions. Andrew is quite active on many MindManager Forums and runs Cabre, a UK-based training firm that provides training on MindManager . It will be great to have Andrew write regularly about MindManger. I for one am looking forward to his blogs and posts.

Freeware round-up

To celebrate six months of Bloody Computer! I have decided to list all the freeware software mentioned here blog so far (partly to prompt me to update the 'Quality Freeware' list in the left-hand column - now renamed 'Recommended Freeware') So, without further ado, here is the list...

Audacity: audio file editor.

AVG anti-virus free edition: anti-virus software.

Beneton Movie GIF: An application to create animated GIFs from a series of images, like a flickbook.

CamStudio: record what you see on your screen.

CCleaner: removes many non-essential files that Windows and other programs leave on your hard-drive.

dBpoweramp: convert audio files from one type to another.

dscaler: view television on your PC, if you have the appropriate hardware.

Foxit Reader: a fully featured PDF reader and a much slimmer alternative to Adobe Acrobat.

FreeUndelete: a user-friendly program to recover deleted files.

The GIMP: a fully featured image editor developed for linux but available for Windows

IcoFX: an icon creator and editor.

IrfanView: an image viewer with few editing features, and including a batch process feature, with which you can change the format of many files in one go.

mp3gain: balance the volume levels of a selection of mp3 files.

Paint.net: a friendly and intuitive image manipulation tool with many of the features found in commercial image editing packages.

PC Inspector's File Recovery: a powerful application for resurrecting deleted or lost files, and faulty drives.

Picard: provides an interface to search the MusicBrainz database and use the information to rename and set tag information on audio files.

Real Alternative: enables you to play RealMedia files without installing RealPlayer.

Spyware Terminator: protect your PC from spyware and other malware.

Startup Control Panel: provides a means to manage which programs run automatically when Windows starts.

TreeSize: a program that provides a graphical representation of how much hard-drive space each folder is using.

VideoLAN VLC media player: multimedia player (plays most video types without need to install extra codecs).

Virtual Dub: video editing and conversion software.

Winamp: a popular mp3 player developing a large user community.

If you wish to see the posts associated with these applications including tutorials for some of them click here.

Monday, February 18, 2008

[TIPS] PowerUP - game to Save the World

This was on the ASCD SmartBrief:
 
 
From the site:
"Teachers, do you dream of a learning resource that will grab your students’ attention and engage them as thoroughly as the video games they play at home and on their mobile phones? Are you looking for a classroom resource that will motivate your students to apply science and math concepts to real world problems? Would you like to spark your students interest in pursuing a career in Science or Engineering?
 
Enter the world of PowerUp, a free, online, multiplayer game that allows students to experience the excitement and the diversity of modern engineering!

Playing the game, students work together in teams to investigate the rich, 3D game environment and learn about the environmental disasters that threaten the game world and its inhabitants.

Players meet Expert Engineer characters and experience the great diversity of the field. Conversations with these experts and engaging interactive activities allow players to explore ways engineers design and build systems to harness renewable energy sources as alternatives to burning fossil fuels.

Players take on the role of Engineers, working together designing and building energy solutions to save the world. "

---
This page: http://www.powerupthegame.org/teachers.html has lesson plans and more.
 
This is a 3d  multiuser game that teaches while they play. Give it a try.
 
Sorry Mac folks, this one is for Windows only. Hey - it's from IBM. What did you expect?

Sunday, February 17, 2008

Informix user authentication: PAM for the rescue (part 2)

I hope you had the chance to read and eventually follow part one of these series of articles related to IDS authentication using PAM. If you did, you already know the basics of PAM and how to setup IDS to authenticate against an LDAP or Active Directory server.
But there are still several topics we need to cover to fully understand IDS PAM authentication:
  • Challenge/response and implicit (no password) connections
  • How to setup distributed query environments using PAM
  • Can we develop customized PAM modules?
  • What are the current IDS PAM limitations?


Challenge/response and implicit connections:

Most of us, people working with Informix, know that besides the usual user/password connection we can establish what we usually call implicit connections. These connections are based on trust relations between the client and the server or between a specific user on the client and a user (the same or other) in the server.

These trusts are configured exactly as the trust relations for the "r" commands (rsh, rcp, rexec etc.).Specifically you must use the /etc/hosts.equiv or the ~user/.rhosts files. Just as a side note, I've found many customers that assume they need these services in order to Informix trusted relations work. This is not correct. You can work with the files even if the services (rshd, rexecd etc.) are down. And it's probably much better to leave the services down since they raise a lot of security issues.
These connections are normally used in environments using 4GL and ESQL/C applications. More modern applications (Java, J2EE, .NET, PHP, Ruby, Python, Perl etc.) use the more usual user/password mechanism. 4GL and ESQL/C can also use user/password, but typically they use the implicit connections for simplicity and because they normally run in more controlled environments.
dbaccess, the ASCII tool that every Informix DBA uses can use both types of connections. If you specify the database in non interactive mode it will try implicit connection, but using the menus or specific instructions will allow you to make user/password connections. So, how does all this relate to IDS PAM authentication? Read on...

PAM is based on a challenge/response mechanism. The modules will throw challenges to applications, and these should respond with the correct answers to these challenges. A correct answer will fulfill the modules requirements and a wrong answer will cause module failure.

So in a sense, you can consider the user/password has a challenge/response case. If the module you're using requires a password and you use a user/password connection everything will be handled transparently for you, assuming the module has been configured in password mode (pamauth=(password) in $INFORMIXSQLHOSTS)

But we can configure the modules in another mode (pamauth=(challenge)). This has to be done if we want to use implicit connections with PAM.
In these cases you have to prepare your application to answer the challenges issued by modules. This is done only in recent versions of Client Software Development Kit (CSDK) and JDBC driver, and the way it works is by allowing you (the developer) to code a callback function to answer challenges. Whenever the authentication modules raise a challenge, the CSDK or JDBC interface code will forward this challenge to your function. Obviously you need to register it as a callback function for PAM authentication. In ESQL/C the API function to do this is called ifx_pam_callback(). You should declare your callback function like this:

int callback(char *challenge, char *response, int msg_style);

and then register it:

ifx_pam_callback(callback);


The callback function must be declared with three arguments:
  1. char *challenge
    The challenge issued by the authentication module
  2. char *response
    The answer provided by the callback function
  3. int msg_style
    The kind of message the module sent
Depending on the module you're using you may choose to give automatic responses or else forward the challenge to the user and allow him to introduce the answer. The msg_style parameter can be used for this, and is the module choice.
If you choose to ask the user, the same callback function may work with very different modules, as long as the user understands the challenges and can provide a correct answer. This approach implies that you'll have to bother the user, which is a different behavior from the traditional implicit mechanism of authentication.
On the other hand you may choose to code the answers in the callback function, or allow it to find the correct answer automatically. This approach forces you to adapt your callback function if you choose to change the authentication modules. As an example you could arrange the callback functions and a PAM module to authenticate through key exchange, or through a set of questions and answers that only an algorithm could understand. Connections would be allowed only to clients using the correct callback function.

In JDBC the callback mechanism is provided by the IfxPAM() method in IfmxPAM interface.
If you have CSDK installed, you can find an example of a callback function being use in an application. Check $INFORMIXDIR/demo/esqlc/pamdemo.ec

But the real beauty comes when you also see the other side. That side is the PAM module itself.
To show you this I will borrow an example published in DeveloperWorks, more exactly here.

The authors are three IBMers who have created an example of a PAM module that I will reproduce here with very small changes:

/*
example from http://www.ibm.com/developerworks/db2/library/techarticle/dm-0704anbalagan/
with slight changes and a few comments
*/


#include <link.h>
#include <string.h>
#include <security/pam_appl.h>
#include <security/pam_modules.h>

#ifndef PAM_EXTERN
#define PAM_EXTERN
#endif


/*
This implements the main PAM API function. This will be called when we create a
PAM service like:

auth pam_demo_mod required


The function signature is defined in the PAM include modules
*/

PAM_EXTERN int
pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc, const char *argv[])
{
struct pam_conv *conv;
struct pam_message msg[3], *msgp;
struct pam_response *resp;
const char *user;
char *answer, *prompt[2], *vanswer[2];
int pam_err, retry;
void *handle = NULL;

/*
Define three prompts. We will raise three challenges. Two questions and an info string.
The answers are shown in parenthesis.
The user will see the questions and the answers. Only for demonstration purposes of course!
*/

prompt[0] = (char *) strdup("Your school name (MIT):");
prompt[1] = (char *) strdup("Your maiden name (SUZE):");

vanswer[0] = (char *) strdup("MIT");
vanswer[1] = (char *) strdup("SUZE");

pam_err = pam_get_item(pamh, PAM_CONV, (void **)&conv);
if (pam_err != PAM_SUCCESS)
return (PAM_SYSTEM_ERR);

msg[0].msg_style = PAM_PROMPT_ECHO_OFF;
msg[0].msg = prompt[0];
msg[1].msg_style = PAM_PROMPT_ECHO_ON;
msg[1].msg = prompt[1];


/*

Send the two challenges to the client

*/

for (retry=0;retry<2;retry++) msgp =" &msg[retry];" resp =" NULL;" pam_err =" (*conv-">conv)(1, &msgp, &resp, conv->appdata_ptr);
if (pam_err == PAM_SUCCESS){

/* No response needed for text info and error msg */
if ((msg[retry].msg_style == PAM_TEXT_INFO) ||
(msg[retry].msg_style == PAM_ERROR_MSG))
{
continue;
}
answer = resp->resp;
if (!answer){
pam_err = PAM_AUTH_ERR;
break;
}
if (strcmp(answer, vanswer[retry])){
pam_err = PAM_AUTH_ERR;
break;
}
}
}
if (resp){
if (resp->resp){
free(resp->resp);
}
free (resp);
}
return (pam_err);
}

/*
The functions below are required, but not used in this module
They are called for account/session etc.
So, we'll just return success
*/

PAM_EXTERN int
pam_sm_setcred(pam_handle_t *pamh, int flags,
int argc, const char *argv[])
{
return (PAM_SUCCESS);
}

PAM_EXTERN int
pam_sm_acct_mgmt(pam_handle_t *pamh, int flags,
int argc, const char *argv[])
{
return (PAM_SUCCESS);
}

PAM_EXTERN int
pam_sm_open_session(pam_handle_t *pamh, int flags,
int argc, const char *argv[])
{
return (PAM_SUCCESS);
}
PAM_EXTERN int
pam_sm_close_session(pam_handle_t *pamh, int flags,
int argc, const char *argv[])
{
return (PAM_SUCCESS);
}

PAM_EXTERN int
pam_sm_chauthtok(pam_handle_t *pamh, int flags,
int argc, const char *argv[])
{
return (PAM_SERVICE_ERR);
}


Create a file called pam_demo_mod.c with the above code and then compile/link it with:


cc -g -c pam_demo_mod.c
ld -G -o pam_demo_mod.so pam_demo_mod.o -lpam


If it works, you should have a pam_demo_mod.so module in your current directory. This is your newly created module. As I mentioned in part 1 of this series, it can be really simple to implement a PAM module.

Now, to show you how this works, we'll have to create another PAM service in our IDS instance.
This is similar to what we've done for LDAP authentication. Follow this steps:
  1. Edit $INFORMIXDIR/etc/$ONCONFIG and add another DBSERVERALIAS (let's call it cheetah_chg):

    DBSERVERALIASES cheetah_pam,cheetah_chg,cheetah_drda                # List of alternate dbservernames

  2. Edit your $INFORMIXSQLHOSTS and configure this new service:


    cheetah_chg onsoctcp pacman.onlinedomus.net 1532 s=4,pam_serv=(ids_pam_challenge),pamauth=(challenge)

    Please note:
    1. We must choose a different PAM service name (ids_pam_challenge)
    2. The pamauth option is set to "challenge"
  3. Create a file called /etc/pam.d/ids_pam_challenge with the following line:
    auth required pam_demo_mod.so
  4. Copy your newly created pam_demo_mod.so to /lib/security (or any other place where your distribution keeps the PAM modules)
  5. Restart your IDS instance

After configuring the server side, it's time to show you the client side. You must use a second machine for this. Follow the following steps:

  1. Make sure you have a stores demo called stores_demo
  2. cd to $INFORMIXDIR/demo/esqlc (in your CSDK installation)
  3. Edit the file called pamdemo.ec: Check the SELECT statement in that file and change it's WHERE clause to "customer_num=104"
  4. compile pamdemo.ec:


    esql -o pamdemo.exe pamdemo.ec

  5. Setup the $INFORMIXSQLHOST file to have the new port we just created in the other host
  6. set the correct INFORMIXSERVER:
    INFORMIXSERVER=cheetah_chg;export INFORMIXSERVER

  7. Run pamdemo.exe:
    ./pam_demo.exe
Answer what you see in parenthesis. You will see something like this:


cheetah_chg@manicminer:fnunes-> ./pamdemo.exe
Starting PAM demo
Callback function registered.
Your school name (MIT):: 1:MIT
Your maiden name (SUZE):: 2:SUZE
SQLCODE ON CONNECT = 0
John Doe

PAM DEMO run completed successfully


You can follow the code, but in brief what happened was that the PAM module we used raised two challenges which were handled and forward to the user by the call back function.
The first challenge expects an answer "MIT" an the second expects "MIT". If any of those are wrong the authentication will fail. The message showed to the user is defined by the callback function, but it can use parameters passed by the module. As I wrote above, this can have the user intervention or not. It's up to the programmer to decide and to implement it in the callback function.
This ends the topic of challenge response and implicit connections using PAM.


How to setup distributed query environments using PAM:

One of the greatest advantage of using PAM comes in fact from a limitation... When you are connected to instance "A" and want to access a database/table in instance "B" you do a distributed query. Something like:


SELECT field1, field2
FROM remote_db@remote_instance:remote_table
WHERE ...


In a typical Informix installation, this would require a trusted relation between the host running the instance to which the application is connected and the host running the remote instance.
Once you setup this trust it would be active for any instance... so you would have to be very careful with the database privileges.
Since PAM works by raising challenges between host and client, and because a distributed query can happen at any time, it would be impossible to establish connection between instances/clients when a distributed query was sent. The solution to this problem introduced a great functionality (IMHO it should have been like this since ever)... You may have noticed that since 9.4+ you have another system database called sysuser.
In this database you'll see a table called sysauth with the following structure:


username char(32)
groupname char(32)
servers char(128)
hosts char(128)


This is the place where you define the "trust" relations between your instance and remote hosts and Informix servers.

I will extend my example above... As you may have noticed I have a host called "Pacman" running an IDS 11.10 instance with the names cheetah (standard port), cheetah_pam (pam in password mode), cheetah_chg (PAM in challenge mode) and cheetah_drda (the new protocol DRDA). The other host I used to run the pamdemo.exe example is called "ManicMiner". In this host I have created another instance called cheetah2. I then start dbaccess on manicminer against instance cheetah2 by running:


cheetah2@manicminer:informix-> dbaccess stores_demo -

Database selected.

> select * from stores_demo@cheetah:customer;

956: Client host or user informix@manicminer is not trusted by the server.

No such file or directory
Error in line 1
Near character position 42
>


The error is expected. I tried to connect to the remote instance normal authentication port and have no trust between Pacman and ManicMiner. Let's see what happens with the PAM enabled port:


cheetah2@manicminer:informix-> dbaccess stores_demo -

Database selected.

> select * from stores_demo@cheetah_pam:customer;

950: User informix@manicminer is not known on the database server.
Error in line 1
Near character position 46


Interesting... I can't access it, as expected, but we have a different error (-950, instead of the usual -956). Let's check it with finderr:


User username is not known on the database server.

This statement refers to a database on another computer system, but the other database server does not accept your account name. You must have a valid trusted login identity on any database server you access remotely. See your database administrator about putting your login ID in 'sysuser:sysauth' on the remote server. This message appears on PAM enabled servers.


Well, it explicitly tells us to use the sysauth table of the sysuser database of the remote instance... So let's get back to the Pacman server and run:


cheetah:PacMan.onlinedomus.net:informix-> dbaccess sysuser -

Database selected.

> insert into sysauth (username, servers, hosts ) values ( 'informix', 'cheetah2', 'manicminer' );

1 row(s) inserted.

>


And now, again on ManicMiner, the same query:


cheetah2@manicminer:informix-> dbaccess stores_demo -

Database selected.

> select * from stores_demo@cheetah_pam:customer;



customer_num 101
fname Ludwig
lname Pauli
company All Sports Supplies
address1 213 Erstwild Court
address2
city Sunnyvale
state CA
zipcode 94086
phone 408-789-8075

...

28 row(s) retrieved.



So, in order to authorize distributed queries in PAM enabled engines/ports, you have to setup the authorizations in the sysauth table of the sysuser database.
You need to specify the username, the instance of origin (servers column) and the hosts originating the query (hosts column). Note the following:
  • Although it's possible to specify more than one server or host in the respective columns (separated by spaces and/or commas), you should always indicate only one server/host per row. This will be easier to maintain (if you need to remove for example) using scripting and it's possible this may change, and in the future it may only support one value
  • The host field specifies the machine where the query comes from. This will be the remote instance host and not the client application host. The existence of both servers and hosts columns allows you to have two instances with the same name in your organization and distinguish between them. I wouldn't suggest having two instances with the same name, but you may want to have it. One for production and the other for quality for example.
  • The groupname apparently is not used at this time. Personally I would love to see this field be used for specifying the default role for the user... But this is just my wish...


Can we develop customized PAM modules?


Well, the quick answer is yes. Above is an example of a dummy PAM module. As you can see it's not very complex. You just have to send challenges and receive responses. You may even just check certain properties setup by the PAM framework and decide if they verify certain criteria (things like time of day, number of sessions for that user, machine load etc.). I would say that with PAM, sky is the limit... But as we'll see further ahead there are still some limitations.

One thing that you must have in mind, in case you think about writing your own modules is security. Be aware, that you'll be defining your database authentication mechanism. You have to be careful! Your code cannot compromise authentication security nor database stability and performance. But don't let this scare you. There are plenty of PAM modules using open source licensing schemes... So, there's a good chance that whatever you need was already developed by someone, and if not, you can get examples and PAM modules skeletons to start with.


What are the current IDS PAM limitations?



Unfortunately, by the time this article is being written, there are quite a few limitations. I will try to enumerate them, and at the same time give you some insight on the status of these limitations. Some of them are perfectly known to the R&D teams, and they'll solve it as soon as possible. But given the current release schedule and the list of features they want to put in IDS it's not easy to start working on some of this issues. Let's see the list. Bear in mind this is my personal view. Nothing here represents IBM positions on any of these topics, and this does not represent any assumption on how or when these issues may be addressed:

  1. PAM is not yet supported in .NET clients
    This is a known issue.
  2. PAM authentication still requires that the OS knows about the user
    The reasons for this odd behavior relate to some features that depend on the existence on an OS identity: SET EXPLAIN to file and SYSTEM command in the stored procedures are two examples of this
    R&D is aware of this problem and accordingly to some talks they already have ideas for solving this
  3. PAM layer does not setup all the PAM framework variables. The PAM API defines these internal variables:
    • PAM_SERVICE
      The service name
    • PAM_USER
      The user name
    • PAM_AUTHTOK
      The user authentication token
    • PAM_OLDAUTHTOK
      The old user authentication token
    • PAM_TTY
      The tty name
    • PAM_RHOST
      The remote host name
    • PAM_RUSER
      The remote user name
    • PAM_CONV
      The pam_conv structure


    At this time, IDS does not establish PAM_RHOST and PAM_RUSER. PAM_RHOST would be good to have... PAM_RUSER is also not set but I have doubts it could be securely establish by IDS. The client libraries can send it, but to assume this is secure would be a mistake since the connection packets can, theoretically be handcrafted.
    I personally believe adding PAM_RHOST would be an easy fix, but I don't know the code...
  4. The groupname field of the sysuser:sysauth table is apparently not used. Accordingly to same sources this would be the OS group of the user. I really don't see great advantage in this. What I would love to see is a way to specify the default role for a remote user (eventually different from his default role, even if this is defined). This would make sense, because we would be able to specify the user default role depending on the connection origin for distributed queries
  5. Documentation!
    PAM is an area where the documentation doesn't live up to its standards (remember that Informix manuals received industry recognition...). All the features should be clearly documented... In fact, this was the main reason to publish these two articles

I think I covered most of the aspects of PAM authentication in IBM Informix Dynamic Server.
With this and the examples on this and the previous article I think anyone should have enough information to test it.

I'd like to end with some references to other material that may be useful, and relates to this:


As always, if you have any comment or doubt don't hesitate in leaving a comment or contact me.
Hope this helps to clarify PAM authentication in IDS. Hopefully more customer feedback and requirements will give R&D more reasons to solve the issues and to improve this functionality.

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Sweet Tomatoes Printable Coupons