Moving to a Distributed File System required testing for a few parity features. One of those was Access-Based Enumeration. This simplifies an end-user's navigation experience because they only see the folders that they have access to. This was in place in our current file servers and would be a tough sell without the feature. Access-based enumeration is easy to turn on for … [Read more...]
The CS Detective – An algorithmic tale of crime, conspiracy, and computation
I just finished The CS Detective by Jeremy Kubica. It is a story of an officer kicked off the police force, turned private investigator. The narrative is a fictional mystery that has the goal of explaining search algorithms and data structures to organize and process searching. The author is a principal engineer at Google with a PhD in robotics from Carnegie Mellon University … [Read more...]
Your 2016 tech gift ideas
It is less than a week to Black Friday and the deals are out there. Are you looking for ideas to add to your own Christmas wish list or looking for gift suggestions for a techie on your list? This article has some of the hot products of 2016 across different budgets so you will be able to find something for everybody. Nintendo Switch While not available yet, you could … [Read more...]
DFS PowerShell cmdlet leaves a .DFSFolderLink entry
When populating your Distributed File System (DFS) namespace using PowerShell, you might notice a tiny quirk as I did. A .DFSFolderLink file gets left behind when using PowerShell. Using the GUI for DFS Management, this file gets deleted when a folder is created at that same level. You can see the file in the image above. The other folder targets work fine (and have … [Read more...]
Shodan – the search engine for Internet-connected devices
Shodan, taking its name from the AI in the System Shock video game series, is a search engine for devices reachable on the Internet. The index is built by crawlers scanning the web 24/7 looking for devices that are reachable on standard ports. This is a valuable resource to understand the security of your organization. You might have some devices intentionally exposed to the … [Read more...]



