Saturday, March 31, 2012

VMware Technical Journal - March 2012

Original Post: http://feedproxy.google.com/~r/Ntpronl/~3/4n-HwMm8fR4/2015-VMware-Technical-Journal-March-2012.html

The VMware Technical Journal is a new online publication. VMware is looking forward to producing future journal issues at regular intervals to highlight the R&D efforts taking place in several different areas of engineering. Their first issue includes papers related to distributed resource management, user experience monitoring, and statistics collection frameworks for virtualized environments, along with several other topics. In future issues they will highlight other areas of VMware R&D, including Cloud Application Platform and End User Computing, and research collaborations with academic partners.


* Introduction by Steve Herrod, CTO
* VisorFS: A Special-purpose File System for Efficient Handling of System Images
* A Software-based Approach to Testing VMware® vSphere® VMkernel Public APIs
* Providing Efficient and Seamless Desktop Services in Ubiquitous Computing Environments
* Comprehensive User Experience Monitoring
* StatsFeeder: An Extensible Statistics Collection Framework for Virtualized Environments
* VMware Distributed Resource Management: Design, Implementation, and Lessons Learned
* Identity, Access Control, and VMware Horizon
* VMworld 2011 Hands-On Labs: Implementation and Workflow


VMware Technical Journal<http://labs.vmware.com/publications/vmware-technical-journal>

Wednesday, March 28, 2012

#gojetsgo

Section 327
Row 12
Seat 13

#gojetsgo

Tuesday, March 20, 2012

Building a BYOD Ready Infrastructure

Post image for Building a BYOD Ready Infrastructure

What can the process of protecting a prized baseball card collection teach us about BYOD security? Let me explain.

A few years ago, my sons and I got hooked regularly visiting a sports collectables store. These days, collecting sports cards is not just about completing team sets or collecting your favorite players.  Now, its about trying to find the rarest cards in perfect condition – sometimes these cards even have a piece of a jersey nameplate or ball leather embedded in it.  If you find a really nice card, you can encase it in a plastic holder, limiting the potential to damage the cardboard. Trying to keep the cards in mint condition while letting my children enjoy them at the same time reminds me of the work we're doing to help CIOs build BYOD-ready infrastructures.

One of the major concerns is that consumer-minded employees are going to bring more than their personal devices to work. Malware and other attack vectors can hitch a ride and wreak havoc on corporate networks, including exposing sensitive information. But resisting the infiltration is futile and unnecessary, especially when you can combine access control with new preventative measures, both on employee devices and corporate networks.

Limit, Audit and Control Access

Employees aren't the only ones with technological innovation on their side. Through application and desktop virtualization, coupled with network segmentation, CIOs can enable the devices of workers to view the network without interacting directly with applications. Essentially, it's like the gadgets see your network through a plastic case, similar to how my boys experience our baseball cards.

CIOs have the power to create buffers that limit, audit and control employee access to corporate data and applications and free them from the hassle of micro-managing thousands of devices. Moving lockdown and lockout controls from the desktop and laptop into the network layer makes it possible to permit any device to connect securely, as my colleagues explain in: Bring your Own Device: Agility through Consistent Delivery.

It's about both controlling the device with MDM policy management, encryption, strong authentication, etc. and appropriately limiting network access for those devices to select services that are rolled out over time.

The bad news is that cultivating an environment that is BYOD-ready isn't as simple as slipping baseball cards into plastic sleeves. Making the transition will require new skills from IT engineers and security teams, up-to-date network access controls and sophisticated corporate governance strategies. Delivering a secure package to an unsecured platform is a vast departure from established methods of application and data delivery (transporting an unsecured object to a secure platform) Employees will be tasked with:

  • Moving access controls from the desktop into the network layer
  • Segmenting network resources into repositories of service
  • Using firewalls as well as intrusion detection/prevention solutions to monitor while controlling communications among silos

The two biggest problems most enterprise are addressing are BYOD itself and strong authentication along with all the security features of MDM.  A firewall can help but solutions such as app portals, VPN solutions, MDM and certificate-based authentication are all needed for BYOD.  The other challenge is trying to address device diversity.  We need both the various configurations for iOS and Android.  We may not ready to bring in ANY device, but limiting platform diversity is the trend.

Emerge with a Stronger, Simpler and Safer Network

They say whatever doesn't kill you makes you stronger. This is the case with building a BYOD-ready infrastructure. The security strategy that we're recommending is baked into the design, not an overlay like traditional structures. Therefore, CIOs who adopt this approach can emerge with simpler and safer networks and reap the rewards of employees managing their own devices for a change.

We're seeing companies phase in this new approach slowly and methodically while continuing to provision desktops and laptops. How about you? Are you BYOD ready? Are you transitioning to a BYOD infrastructure? If so, what challenges are you finding? Please share your experiences in the comment box so your peers learn from you.

Many thanks to Nalneesh Gaur for the insights and ideas for this post.

Image shared by Kevin O'Connor

Original Post: 

Bell planning to build cellphone towers that look like trees in the Muskoka area


Cellphone towers are not the most attractive structure in the world. They provide a valuable service, but also litter our fine land. Bell has come up with a solution to bring better reception to cottage country and somewhat keep the landscape intact. Bell is planning on constructing 20 cellphone towers (sized between 25 and 29 meters) that look like trees in the Muskoka area. Planning is still in the works, but Bell is targeting the tree towers in Brackenrig, Foot's Bay, Port Carling East, Port Sandfield, Walker's Point East, Breezy Point Road and Little Lake Joseph.

To achieve the look of an actual tree, the cellphone base – trunks – are made of steel, while the branches are made of fibre glass. Bell spokesperson Jason Laszlo said that "The equipment comes to the location prefabricated and is assembled on site. When complete, the tree will stand between 25 and 29 meters and will be positioned to blend with existing trees".

I've gotta say that "tree" looks better than the usual white tower we see. However, Alice Murphy, the mayor of the Township of Muskoka Lakes, has a different viewpoint and seems to be unimpressed. Murphy stated that "It's really bizarre looking at them in the picture … it's like a white pine on steroids".

Source: The Star


Sunday, March 18, 2012

Siri wont help with chores either



Ask Siri to help me with a todo list, and she (like my kids) refuse to do chores on the weekend!!!

Dam u Siri, your getting turned off again!

Thursday, March 15, 2012

VMUG March 8th, 2012 - EMC Presentation

You can view Chris' presentation online here:

http://portal.sliderocket.com/BLUKM/Winnipeg-VMUG_-March-2012

 

Chris Fraser, VCP, VTSP, VSP, EMCISA, CCA Sr. vSpecialist, EMC

Cell: (604) 754-0175

Tw: @CoureurDeNuage

Everything VMware @ EMC: http://emc.com/everythingvmware

 

Chis also suggested some additional reading for everyone :)

VMware vStorage Virtual Machine File System - Technical Overview and Best Practices

http://www.vmware.com/resources/techresources/10110

 

Scalable Storage Performance (dated but still does a great job of describing file system implementation and some internals)

http://www.vmware.com/resources/techresources/1059

 

VMFS – Best Practices, and counter-FUD

http://virtualgeek.typepad.com/virtual_geek/2009/03/vmfs-best-practices-and-counter-fud.html

 

vSphere 5 Storage Guide

http://pubs.vmware.com/vsphere-50/topic/com.vmware.vsphere.storage.doc_50/GUID-8AE88758-20C1-4873-99C7-181EF9ACFA70.html

 

SAN System Design and Deployment Guide

http://www.vmware.com/files/pdf/techpaper/SAN_Design_and_Deployment_Guide.pdf

 

Fibre Channel SAN Configuration Guide

http://www.vmware.com/pdf/vsphere4/r41/vsp_41_san_cfg.pdf

 

iSCSI SAN Configuration Guide

http://www.vmware.com/pdf/vsphere4/r41/vsp_41_iscsi_san_cfg.pdf

 

Troubleshooting Tools

vSCSIstats

http://communities.vmware.com/docs/DOC-10095

http://www.yellow-bricks.com/2009/12/17/vscsistats/

 

EMC/VMware Tools for Performance Monitoring http://virtualgeek.typepad.com/virtual_geek/2011/04/emcvmware-performance-toolkit.html

 

Some discussion on multi-pathing and NMP RR http://virtualgeek.typepad.com/virtual_geek/2010/03/understanding-more-about-nmp-rr-and-iooperationslimit1.html

http://virtualgeek.typepad.com/virtual_geek/2009/06/vmware-io-queues-micro-bursting-and-multipathing.html

 

NFS

http://virtualgeek.typepad.com/virtual_geek/2009/06/a-multivendor-post-to-help-our-mutual-nfs-customers-using-vmware.html

 

iSCSI

Old but great articles on iSCSI with vSphere http://virtualgeek.typepad.com/virtual_geek/2009/01/a-multivendor-post-to-help-our-mutual-iscsi-customers-using-vmware.html

http://virtualgeek.typepad.com/virtual_geek/2009/09/a-multivendor-post-on-using-iscsi-with-vmware-vsphere.html

 

iSCSI SAN Topologies

http://www.emc.com/collateral/hardware/technical-documentation/h8080-iscsi-san-topologies.pdf

 

VAAI

http://virtualgeek.typepad.com/virtual_geek/2011/07/vstorage-apis-for-array-integration-vaai-vsphere-5-edition.html

 

VAAI Thin Provisioning Reclaim bug

http://virtualgeek.typepad.com/virtual_geek/2011/10/urgent-vaaithin-provision-reclaim-on-hold-workaround.html

 

VMDK alignment & UBER Align

http://www.yellow-bricks.com/2010/04/08/aligning-your-vms-virtual-harddisks/

http://virtualgeek.typepad.com/virtual_geek/2010/06/so-why-all-the-fuss-about-alignment.html

http://virtualgeek.typepad.com/virtual_geek/2011/11/first-of-a-series-of-holiday-giftsuberalign.html

 

Thin/Virtual Provisioning

http://virtualgeek.typepad.com/virtual_geek/2009/04/thin-on-thin-where-should-you-do-thin-provisioning-vsphere-40-or-array-level.html

http://vpivot.com/2012/02/01/vmware-thin-disks-on-emc-virtual-provisioning/

 

EMC Docs

VNX TechBook

http://virtualgeek.typepad.com/virtual_geek/2012/01/new-emc-vsphere-techbooksget-em-while-theyre-hot.html

 

Virtual Storage Integrator

http://virtualgeek.typepad.com/virtual_geek/2012/01/emc-virtual-storage-integrator-v51released.html

 

VAAI for block/file

http://www.emc.com/collateral/hardware/white-papers/h8293-vaai-vnx-wp.pdf

http://www.emc.com/collateral/hardware/white-papers/h8292-vaai-with-nfs-on-vnx-wp.pdf

 

FAST & FASTCache

http://www.emc.com/collateral/software/white-papers/h8058-fast-vp-unified-storage-wp.pdf

http://www.emc.com/collateral/software/white-papers/h8046-clariion-celerra-unified-fast-cache-wp.pdf

 

Clariion CX4 TechBooks

http://www.emc.com/collateral/software/solution-overview/h2197-vmware-esx-clariion-stor-syst-ldv.pdf

http://www.emc.com/collateral/hardware/white-papers/h5773-clariion-best-practices-performance-availability-wp.pdf

http://www.emc.com/collateral/hardware/white-papers/h5512-emc-clariion-virtual-provisioning-wp.pdf

 

Celerra Techbook

http://www.emc.com/collateral/hardware/technical-documentation/h5536-vmware-esx-srvr-using-celerra-stor-sys-wp.pdf

 

Symmetrix TechBooks & Whitepapers

VMax on vSphere TechBook (Updated for vSphere 5!!) http://www.emc.com/collateral/hardware/solution-overview/h2529-vmware-esx-svr-w-symmetrix-wp-ldv.pdf

http://www.emc.com/collateral/hardware/white-papers/h6813-implting-symmetrix-vrtl-prvsning-vsphere-wp.pdf

http://www.emc.com/collateral/software/technical-documentation/h7095-vsi-storage-pool-mngt-tb.pdf

 

Details on NMP RR on VMax

http://www.emc.com/collateral/hardware/white-papers/h8119-tuning-vmware-symmetrix-wp.pdf

http://virtualgeek.typepad.com/virtual_geek/2010/03/understanding-more-about-nmp-rr-and-iooperationslimit1.html

 

Storage Pools Deep Dive

http://virtualeverything.wordpress.com/2011/03/05/emc-storage-pool-deep-dive-design-considerations-caveats/

http://storagezilla.typepad.com/storagezilla/2010/05/the-clariion-storage-pool.html

http://storagezilla.typepad.com/storagezilla/2010/05/storage-services-for-clariion-storage-pool-luns.html

 

And for the folks who were curious about the Stretched Cluster topic, I can offer the following resources:

 

Understanding vSphere Stretched Clusters, Disaster Recovery, and Planned Workload Mobility http://virtualgeek.typepad.com/virtual_geek/2011/09/vmworld-2011-content-bco2479-understanding-vsphere-stretched-clusters-disaster-recovery-and-planned-workload-mobility.html

http://virtualgeek.typepad.com/virtual_geek/2011/10/new-vmware-hcl-category-vsphere-metro-stretched-cluster.html

 

Stretched Cluster Presentation

http://blog.scottlowe.org/2011/10/03/updated-stretched-cluster-presentation/

 

Video of Stretched Cluster Presentation (delivered by the Jedi Master himself, Scott Lowe) http://blog.scottlowe.org/2011/07/18/video-of-stretched-cluster-presentation/

 

vSphere 5.0 HA and metro / stretched cluster solutions http://www.yellow-bricks.com/2011/10/05/vsphere-5-0-ha-and-metro-stretched-cluster-solutions/

 

Understanding vSphere Disaster Recovery/Avoidance options http://virtualgeek.typepad.com/virtual_geek/2010/11/understanding-vsphere-disaster-recoveryavoidance-options-part-i.html

http://virtualgeek.typepad.com/virtual_geek/2010/12/understanding-vsphere-disaster-recoveryavoidance-options-part-ii-understanding-emc-vplex-partition-and-vm-ha.html

http://virtualgeek.typepad.com/virtual_geek/2010/12/understanding-vsphere-disaster-recoveryavoidance-options-part-iii-areas-of-development.html

http://virtualgeek.typepad.com/virtual_geek/2010/12/understanding-vsphere-disaster-recoveryavoidance-options.html

 

VMware support statements

vSphere  Metro Stretched Cluster (VMware supported) KB:

http://<http://kb.vmware.com/kb/2007545>kb.vmware.com/kb/2007545<http://kb.vmware.com/kb/2007545>

http://virtualgeek.typepad.com/virtual_geek/2011/10/new-vmware-hcl-category-vsphere-metro-stretched-cluster.html

 

vMotion over Distance support with EMC VPLEX Metro

http://kb.vmware.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=1021215&sliceId=1&docTypeID=DT_KB_1_1&dialogID=238990955&stateId=1%200%20238996306

 

Using VPLEX Metro with VMware HA

http://kb.vmware.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=1026692&sliceId=1&docTypeID=DT_KB_1_1&dialogID=238990955&stateId=1%200%20238996306

http<http://powerlink.emc.com/km/live1/en_US/Offering_Technical/White_Paper/h8218-vplex-metro-vmware-ha-wp.pdf>://powerlink.emc.com/km/live1/en_US/Offering_Technical/White_Paper/h8218-vplex-metro-vmware-ha-wp.pdf<http://powerlink.emc.com/km/live1/en_US/Offering_Technical/White_Paper/h8218-vplex-metro-vmware-ha-wp.pdf>

 

USING VMWARE VSPHERE WITH EMC VPLEX

http://www.emc.com/collateral/hardware/white-papers/h7118-using-vmware-virtualization-platforms-vplex.pdf

 

VPLEX Metro 5.0 and Application Mobility with vSphere 4.1 http://www.emc.com/collateral/hardware/white-papers/vplex-metro-app-mobility-vsphere.pdf

EMC VPLEX Metro Witness Technology and High Availability http://www.emc.com/collateral/hardware/technical-documentation/h7113-vplex-architecture-deployment.pdf

 

Wednesday, March 7, 2012

Introducing: Log Parser Studio

Anyone who regularly uses Log Parser 2.2 knows just how useful and powerful it can be for obtaining valuable information from IIS (Internet Information Server) and other logs. In addition, adding the power of SQL allows explicit searching of gigabytes of logs returning only the data that is needed while filtering out the noise. The only thing missing is a great graphical user interface (GUI) to function as a front-end to Log Parser and a 'Query Library' in order to manage all those great queries and scripts that one builds up over time.

Log Parser Studio was created to fulfill this need; by allowing those who use Log Parser 2.2 (and even those who don't due to lack of an interface) to work faster and more efficiently to get to the data they need with less "fiddling" with scripts and folders full of queries.

With Log Parser Studio (LPS for short) we can house all of our queries in a central location. We can edit and create new queries in the 'Query Editor' and save them for later. We can search for queries using free text search as well as export and import both libraries and queries in different formats allowing for easy collaboration as well as storing multiple types of separate libraries for different protocols.

Processing Logs for Exchange Protocols

We all know this very well: processing logs for different Exchange protocols is a time consuming task. In the absence of special purpose tools, it becomes a tedious task for an Exchange Administrator to sift thru those logs and process them using Log Parser (or some other tool), if output format is important. You also need expertise in writing those SQL queries. You can also use special purpose scripts that one can find on the web and then analyze the output to make some sense of out of those lengthy logs. Log Parser Studio is mainly designed for quick and easy processing of different logs for Exchange protocols. Once you launch it, you'll notice tabs for different Exchange protocols, i.e. Microsoft Exchange ActiveSync (MAS), Exchange Web Services (EWS), Outlook Web App (OWA/HTTP) and others. Under those tabs there are tens of SQL queries written for specific purposes (description and other particulars of a query are also available in the main UI), which can be run by just one click!

Let's get into the specifics of some of the cool features of Log Parser Studio

Query Library and Management

Upon launching LPS, the first thing you will see is the Query Library preloaded with queries. This is where we manage all of our queries. The library is always available by clicking on the Library tab. You can load a query for review or execution using several methods. The easiest method is to simply select the query in the list and double-click it. Upon doing so the query will auto-open in its own Query tab. The Query Library is home base for queries. All queries maintained by LPS are stored in this library. There are easy controls to quickly locate desired queries & mark them as favorites for quick access later.

image

Library Recovery

The initial library that ships with LPS is embedded in the application and created upon install. If you ever delete, corrupt or lose the library you can easily reset back to the original by using the recover library feature (Options | Recover Library). When recovering the library all existing queries will be deleted. If you have custom/modified queries that you do not want to lose, you should export those first, then after recovering the default set of queries, you can merge them back into LPS.

Import/Export

Depending on your need, the entire library or subsets of the library can be imported and exported either as the default LPS XML format or as SQL queries. For example, if you have a folder full of Log Parser SQL queries, you can import some or all of them into LPS's library. Usually, the only thing you will need to do after the import is make a few adjustments. All LPS needs is the base SQL query and to swap out the filename references with '[LOGFILEPATH]' and/or '[OUTFILEPATH]' as discussed in detail in the PDF manual included with the tool (you can access it via LPS | Help | Documentation).

Queries

Remember that a well-written structured query makes all the difference between a successful query that returns the concise information you need vs. a subpar query which taxes your system, returns much more information than you actually need and in some cases crashes the application.

image

The art of creating great SQL/Log Parser queries is outside the scope of this post, however all of the queries included with LPS have been written to achieve the most concise results while returning the fewest records. Knowing what you want and how to get it with the least number of rows returned is the key!

Batch Jobs and Multithreading

You'll find that LPS in combination with Log Parser 2.2 is a very powerful tool. However, if all you could do was run a single query at a time and wait for the results, you probably wouldn't be making near as much progress as you could be. In lieu of this LPS contains both batch jobs and multithreaded queries.

A batch job is simply a collection of predefined queries that can all be executed with the press of a single button. From within the Batch Manager you can remove any single or all queries as well as execute them. You can also execute them by clicking the Run Multiple Queries button or the Execute button in the Batch Manager. Upon execution, LPS will prepare and execute each query in the batch. By default LPS will send ALL queries to Log Parser 2.2 as soon as each is prepared. This is where multithreading works in our favor. For example, if we have 50 queries setup as a batch job and execute the job, we'll have 50 threads in the background all working with Log Parser simultaneously leaving the user free to work with other queries. As each job finishes the results are passed back to the grid or the CSV output based on the query type. Even in this scenario you can continue to work with other queries, search, modify and execute. As each query completes its thread is retired and its resources freed. These threads are managed very efficiently in the background so there should be no issue running multiple queries at once.

image

Now what if we did want the queries in the batch to run concurrently for performance or other reasons? This functionality is already built-into LPS's options. Just make the change in LPS | Options | Preferences by checking the 'Process Batch Queries in Sequence' checkbox. When checked, the first query in the batch is executed and the next query will not begin until the first one is complete. This process will continue until the last query in the batch has been executed.

Automation

In conjunction with batch jobs, automation allows unattended scheduled automation of batch jobs. For example we can create a scheduled task that will automatically run a chosen batch job which also operates on a separate set of custom folders. This process requires two components, a folder list file (.FLD) and a batch list file (.XML). We create these ahead of time from within LPS. For more details on how to do that, please refer to the manual.

Charts

Many queries that return data to the Result Grid can be charted using the built-in charting feature. The basic requirements for charts are the same as Log Parser 2.2, i.e.

  1. The first column in the grid may be any data type (string, number etc.)
  2. The second column must be some type of number (Integer, Double, Decimal), Strings are not allowed

Keep the above requirements in mind when creating your own queries so that you will consciously write the query to include a number for column two. To generate a chart click the chart button after a query has completed. For #2 above, even if you forgot to do so, you can drag any numbered column and drop it in the second column after the fact. This way if you have multiple numbered columns, you can simply drag the one that you're interested in, into second column and generate different charts from the same data. Again, for more details on charting feature, please refer to the manual.

image

Keyboard Shortcuts/Commands

There are multiple keyboard shortcuts built-in to LPS. You can view the list anytime while using LPS by clicking LPS | Help | Keyboard Shortcuts. The currently included shortcuts are as follows:

Shortcut What it does
CTRL+N Start a new query.
CTRL+S Save active query in library or query tab depending on which has focus.
CTRL+Q Open library window.
CTRL+B Add selected query in library to batch.
ALT+B Open Batch Manager.
CTRL+B Add the selected queries to batch.
CTRL+D Duplicates the current active query to a new tab.
CTRL+ALT+E Open the error log if one exists.
CTRL+E Export current selected query results to CSV.
ALT+F Add selected query in library to the favorites list.
CTRL+ALT+L Open the raw Library in the first available text editor.
CTRL+F5 Reload the Library from disk.
F5 Execute active query.
F2 Edit name/description of currently selected query in the Library.
F3 Display the list of IIS fields.

Supported Input and Output types

Log Parser 2.2 has the ability to query multiple types of logs. Since LPS is a work in progress, only the most used types are currently available. Additional input and output types will be added when possible in upcoming versions or updates.

Supported Input Types

Full support for W3SVC/IIS, CSV, HTTP Error and basic support for all built-in Log Parser 2.2 input formats. In addition, some custom written LPS formats such as Microsoft Exchange specific formats that are not available with the default Log Parser 2.2 install.

Supported Output Types

CSV and TXT are the currently supported output file types.

Log Parser Studio - Quick Start Guide

Want to skip all the details & just run some queries right now? Start here …

The very first thing Log Parser Studio needs to know is where the log files are, and the default location that you would like any queries that export their results as CSV files to be saved.

1. Setup your default CSV output path:

a. Go to LPS | Options | Preferences | Default Output Path.

b. Browse to and select the folder you would like to use for exported results.

c. Click Apply.

d. Any queries that export CSV files will now be saved in this folder.
NOTE: If you forget to set this path before you start the CSV files will be saved in %AppData%\Microsoft\Log Parser Studio by default but it is recommended that you move this to another location.

2. Tell LPS where the log files are by opening the Log File Manager. If you try to run a query before completing this step LPS will prompt and ask you to set the log path. Upon clicking OK on that prompt, you are presented with the Log File Manager. Click Add Folder to add a folder or Add File to add a single or multiple files. When adding a folder you still must select at least one file so LPS will know which type of log we are working with. When doing so, LPS will automatically turn this into a wildcard (*.xxx) Indicating that all matching logs in the folder will be searched.

You can easily tell which folder or files are currently being searched by examining the status bar at the bottom-right of Log Parser Studio. To see the full path, roll your mouse over the status bar.

NOTE: LPS and Log Parser handle multiple types of logs and objects that can be queried. It is important to remember that the type of log you are querying must match the query you are performing. In other words, when running a query that expects IIS logs, only IIS logs should be selected in the File Manager. Failure to do this (it's easy to forget) will result errors or unexpected behavior will be returned when running the query.

3. Choose a query from the library and run it:

a. Click the Library tab if it isn't already selected.

b. Choose a query in the list and double-click it. This will open the query in its own tab.

c. Click the Run Single Query button to execute the query

The query execution will begin in the background. Once the query has completed there are two possible outputs targets; the result grid in the top half of the query tab or a CSV file. Some queries return to the grid while other more memory intensive queries are saved to CSV.

As a general rule queries that may return very large result sets are probably best served going to a CSV file for further processing in Excel. Once you have the results there are many features for working with those results. For more details, please refer to the manual.

Have fun with Log Parser Studio! & always remember – There's a query for that!

Kary Wall
Escalation Engineer
Microsoft Exchange Support

Sunday, March 4, 2012

The Pwn Plug is a little white box that can hack your network


When Jayson E. Street broke into the branch office of a national bank in May of last year, the branch manager could not have been more helpful. Dressed like a technician, Street walked in and said he was there to measure "power fluctuations on the power circuit." To do this, he'd need to plug a small white device that looked like a power adapter onto the wall.

The power fluctuation story was total BS, of course. Street had been hired by the bank to test out security at 10 of its West Coast branch offices. He was conducting what's called a penetration test. This is where security experts pretend to be bad guys in order to spot problems.

In this test, bank employees were only too willing to help out. They let Street go anywhere he wanted—near the teller windows, in the vault—and plug in his little white device, called a Pwn Plug

"At one branch, the bank manager got out of the way so I could put it behind her desk," Street says. The bank, which Street isn't allowed to name, called the test off after he'd broken into the first four branches. "After the fourth one they said, 'Stop now please. We give up.'"

Built by a startup company called Pwnie Express, the Pwn Plug is pretty much the last thing you ever want to find on your network—unless you've hired somebody to put it there. It's a tiny computer that comes preloaded with an arsenal of hacking tools. It can be quickly plugged into any computer network and then used to access it remotely from afar. And it comes with "stealthy decal stickers"—including a little green flowerbud with the word "fresh" underneath it, that makes the device look like an air freshener—so that people won't get suspicious.

The Pwn Plug installed during Street's May penetration test
The Pwn Plug installed during Street's May penetration test

The basic model costs $480, but if you're willing to pay an extra $250 for the Elite version, you can connect it over the mobile wireless network. "The whole point is plug and pwn," says Dave Porcello, Pwnie Express's CEO. "Walk into a facility, plug it in, wait for the text message. Before you even get to the parking lot you should know it's working."

Porcello decided to start making the Pwn Plug after coming across the SheevaPlug, a miniature low-power Linux computer built by Globalscale Technologies that looks just like a power adapter. "I saw it and I was like, 'Oh my god this is the hacker's dropbox,'" Porcello says. Dropboxes have been around for a few decades, but until now they've been customized computers that hackers or pen testers like Street build and sneak, unobserved onto corporate networks.

Now Pwnie Express has taken the idea commercial and built a product that anyone can easily configure and use. It turns out that they're also a great way for corporations to test out security at their regional offices. Porcellos says that the Bank of America is mailing the Pwn Plug to its regional offices and having bank mangers plug them into the network. Then security experts at corporate HQ can check the network for vulnerabilities.

Another Internet service provider—Porcello wasn't allowed to name it—is using the devices to remotely connect to regional offices via a GSM mobile wireless network and troubleshoot networking problems.

The device can save companies big money, Porcello says. "You've got companies like T.J.Maxx that have thousands of retail stores and every single one of them has got a computer network," he says. "Right now they're actually flying people out to the stores to spot check and do penetration basis, but now with something like this you don't have to travel."

Porcello was just a bored security manager at an insurance company when he started building the Pwn Plugs back in 2010. But pretty soon he was selling enough to quit his day job. "We started getting orders from Fortune 50 companies and the DoD and I was like, 'OK I'll do this now instead.'"

Thursday, March 1, 2012

Play Angry Birds With a Real USB Sling Shot

Original Post: http://www.iphoneincanada.ca/apple-hardware/play-angry-birds-with-a-real-usb-sling-shot/

I know, I know, this is not about iPhones, but you can't deny that Angry Birds has become an international hit, because of the iPhone. It has since been ported to other operating systems, mobile and desktop. A company called mBed has created a USB sling shot to work with your PC or Mac, to really play Angry Birds.

The device features an accelorometer and a rubber stretch sensor to control the sling shot in the Angry Birds game. Now you can really get the feeling of flinging the birds accross the landscape to get those darn pigs.

Sadly, mBed doesn't mentions plans to bring this to market. It was more of a project to show how easy and inexpensive it is to create a simple USB device. If you want to make your own, they have posted full instructions, code, and materials needed on their website.

via Discovery.com