Suche senden
Hochladen
10 Dumb Things It Pros
âą
0 gefÀllt mir
âą
575 views
international school manila
Folgen
Technologie
Melden
Teilen
Melden
Teilen
1 von 4
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
Designing airportextreme802.11nnetworks
Designing airportextreme802.11nnetworks
international school manila
Â
brother 2170
brother 2170
international school manila
Â
The Blue
The Blue
international school manila
Â
Air Port Extreme 802.11n User Guide
Air Port Extreme 802.11n User Guide
international school manila
Â
Breastexam
Breastexam
international school manila
Â
The art of being well 1
The art of being well 1
international school manila
Â
2024 State of Marketing Report â by Hubspot
2024 State of Marketing Report â by Hubspot
Marius Sescu
Â
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
Expeed Software
Â
Empfohlen
Designing airportextreme802.11nnetworks
Designing airportextreme802.11nnetworks
international school manila
Â
brother 2170
brother 2170
international school manila
Â
The Blue
The Blue
international school manila
Â
Air Port Extreme 802.11n User Guide
Air Port Extreme 802.11n User Guide
international school manila
Â
Breastexam
Breastexam
international school manila
Â
The art of being well 1
The art of being well 1
international school manila
Â
2024 State of Marketing Report â by Hubspot
2024 State of Marketing Report â by Hubspot
Marius Sescu
Â
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
Expeed Software
Â
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Â
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
Â
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Â
đŹ The future of MySQL is Postgres đ
đŹ The future of MySQL is Postgres đ
RTylerCroy
Â
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Â
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
Â
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
V3cube
Â
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Â
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Â
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(âïž+971_581248768%)**%*]'#abortion pills for sale in dubai@
Â
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
Â
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
Â
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
Â
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
Â
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
Â
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel AraĂșjo
Â
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Â
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Â
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Â
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Â
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
Pixeldarts
Â
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
Â
Weitere Àhnliche Inhalte
KĂŒrzlich hochgeladen
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Â
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
Â
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Â
đŹ The future of MySQL is Postgres đ
đŹ The future of MySQL is Postgres đ
RTylerCroy
Â
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Â
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
Â
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
V3cube
Â
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Â
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Â
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(âïž+971_581248768%)**%*]'#abortion pills for sale in dubai@
Â
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
Â
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
Â
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
Â
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
Â
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
Â
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel AraĂșjo
Â
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Â
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Â
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Â
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Â
KĂŒrzlich hochgeladen
(20)
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Â
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Â
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Â
đŹ The future of MySQL is Postgres đ
đŹ The future of MySQL is Postgres đ
Â
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Â
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Â
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
Â
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Â
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Â
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Â
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Â
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Â
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Â
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Â
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
Â
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Â
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Â
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Â
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Â
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Â
Empfohlen
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
Pixeldarts
Â
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
Â
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
marketingartwork
Â
Skeleton Culture Code
Skeleton Culture Code
Skeleton Technologies
Â
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
Â
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
Â
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
Â
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
Â
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
Â
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
Â
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
Â
Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
Â
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
Â
How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
Â
Introduction to Data Science
Introduction to Data Science
Christy Abraham Joy
Â
Time Management & Productivity - Best Practices
Time Management & Productivity - Best Practices
Vit Horky
Â
The six step guide to practical project management
The six step guide to practical project management
MindGenius
Â
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
Â
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Applitools
Â
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
GetSmarter
Â
Empfohlen
(20)
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
Â
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
Â
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
Â
Skeleton Culture Code
Skeleton Culture Code
Â
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Â
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
Â
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Â
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Â
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Â
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
Â
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Â
Getting into the tech field. what next
Getting into the tech field. what next
Â
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Â
How to have difficult conversations
How to have difficult conversations
Â
Introduction to Data Science
Introduction to Data Science
Â
Time Management & Productivity - Best Practices
Time Management & Productivity - Best Practices
Â
The six step guide to practical project management
The six step guide to practical project management
Â
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Â
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Â
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
Â
10 Dumb Things It Pros
1.
10 dumb things
IT pros do Version 1.0 that can mess up their networks August 23, 2006 By Debra Littlejohn Shinder, MCSE, MVP One of the most popular pastimes of IT professionals is complaining about the dumb things users do. We all get a laugh from articles like "10 classic clueless-user stories." But if weâre honest, we have to admit that computer novices arenât the only ones who make mistakes. Most network administrators could (but probably wonât) tell you about their âmost embarrassing moment." Thatâs the one where you discover you accidentally misconfigured the firewall to shut down the bossâs Internet connection or that the backup youâve been making every day has been copying the wrong files. Oops. Letâs take a look at some of the most common dumb things IT pros do that can mess up their networksâand how you can avoid making such mistakes yourself. 1 Donât have a comprehensive backup and disaster recovery plan Itâs not that backing up is hard to do. The problem is that it sometimes gets lost in the shuffle, because most network administrators are overloaded already, and backups are something that seem like a waste of time and effortâuntil you need them. Of course you back up your organizationâs important data. Iâm not suggesting that most admins donât have a backup strategy in place. But many of those backup strategies havenât changed in decades. You set up a tape backup to copy certain important files at specified intervals and then forget about it. You donât get around to assessing and updating that backup strategyâor even testing the tapes periodically to make sure your data really is getting backed upâuntil something forces you to do so (the tape system breaks or worse, you have a catastrophic data loss that forces you to actually use those backups). Itâs even worse when it comes to full-fledged disaster recovery plans. You may have a written business continuity plan languishing in a drawer somewhere, but is it really up to date? Does it take into account all of your current equipment and personnel? Are all critical personnel aware of the plan? (For instance, new people may have been hired into key positions since the time the plan was formulated.) Does the plan cover all important elements, including how to detect the problem as quickly as possible, how to notify affected persons, how to isolate affected systems, and what actions to take to repair the damage and restore productivity? 2 Ignore warning signs That UPS has been showing signs of giving up the ghost for weeks. Or the mail server is suddenly having to be rebooted several times per day. Users are complaining that their Web connectivity mysteriously drops for a few minutes and then comes back. But things are still working, sort of, so you put off investigating the problem until the day you come into work and network is down. As with our physical health, it pays to heed early warning signs that something is wrong with the network and catch it before it becomes more serious. 3 Never document changes When you make changes to the serverâs configuration settings, it pays to take the time to document them. Youâll be glad you did if a physical disaster destroys the machine or the operating system fails and you have to start over from scratch. Circumstances donât even have to be that drastic; what if you just make new changes that donât work the way you expected, and you donât quite remember the old settings? Sure, it takes a little time, but like backing up, itâs worth the effort. Page 1 Copyright ©2006 CNET Networks, Inc. All rights reserved. For more downloads and a free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html
2.
10 dumb things
IT pros do that can mess up their networks 4 Donât waste space on logging One way to save hard disk space is to forego enabling logging or set your log files to overwrite at a small file size threshold. The problem with that is that disk space is relatively cheap, but hours of pulling your hair out when youâre trying to troubleshoot a problem without logs to help you discover what happened can be costly, in terms of both money and frustration. Some applications donât have their logs turned on automatically. But if you want to save yourself a lot of grief when something goes wrong, adopt the philosophy of âeverything that can be logged should be logged.â 5 Take your time about installing critical updates The âIt'll never happen to meâ syndrome has been the downfall of many networks. Yes, updates and patches sometimes break important applications, cause connectivity problems, or even crash the operating system. You should thoroughly test upgrades before you roll them out to prevent such occurrences. But you should do so as quickly as possible and get those updates installed once youâve determined that theyâre safe. Remember that Nimda and other major virus or worm infestations have done untold damage to systems even though the patches for them had already been released. 6 Save time and money by putting off upgrades Upgrading your operating systems and mission-critical applications can be time consuming and expensive. But putting off upgrades for too long can cost you even more, especially in terms of security. There are a couple of reasons for that: New software usually has more security mechanisms built in. There is a much greater focus on writing secure code today than in years past. Vendors generally retire support for older software after awhile. That means they stop releasing security patches for it, so if youâre running the old stuff, you may not be protected against new vulnerabilities. If upgrading all the systems in your organization isnât feasible, do the upgrade in stages, concentrating on the most exposed systems first. 7 Manage passwords sloppily Although multifactor authentication (smart cards, biometrics) is becoming more popular, most organizations still depend on user names and passwords to log onto the network. Bad password policies and sloppy password management create a weak link that can allow attackers to invade your systems with little technical skill needed. Require lengthy, complex passwords (or better, passphrases), require users to change them frequently, and donât allow reuse of the same passwords over and over. Enforce password policies through Windows group policy or third-party products. Ensure that users are educated about the necessity to keep passwords confidential and are forewarned about the techniques that social engineers may use to discover their passwords. If at all possible, implement a second authentication method (something you have or something you are) in addition to the password or PIN (something you know). Page 2 Copyright ©2006 CNET Networks, Inc. All rights reserved. For more downloads and a free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html
3.
10 dumb things
IT pros do that can mess up their networks 8 Try to please all the people all of the time Network administration isnât the job for someone who needs to be liked by everyone. Youâll often be setting down and enforcing rules that users donât like. Resist the temptation to make exceptions (âOkay, weâll configure the firewall to allow you to use instant messaging since you asked so nicely.â) Itâs your job to see that users have the access they need to do their jobsâand no more. 9 Donât try to please any of the people any of the time Just as itâs important to stand your ground when the security or integrity of the network is at stake, itâs also important to listen to both management and your users, find out what they do need to do their jobs, and make it as easy for them as you canâwithin the parameters of your mission (a secure and reliable network). Donât lose sight of the reason the network exists in the first place: so that users can share files and devices, send and receive mail, access the Internet, etc. If you make those tasks unnecessarily difficult for them, theyâll just look for ways to circumvent your security measures, possibly introducing even worse threats. 10 Make yourself indispensable by not training anyone else to do your job This is a common mistake throughout the business world, not just in IT. You think if youâre the only one who knows how the mail server is configured or where all the switches are, your job will be secure. This is another reason some administrators fail to document the network configuration and changes. The sad fact is: no one is indispensable. If you got hit by a truck tomorrow, the company would go on. Your secrecy might make things a lot more difficult for your successor, but eventually he or she will figure it out. In the meantime, by failing to train others to do your tasks, you may lock yourself into a position that makes it harder to get a promotion⊠or even take a vacation. Debra Littlejohn Shinder is a technology consultant, trainer and writer who has authored a number of books on computer operating systems, networking, and security. These include Scene of the Cybercrime: Computer Forensics Handbook, published by Syngress, and Computer Networking Essentials, published by Cisco Press. She is co-author, with her husband, Dr. Thomas Shinder, of Troubleshooting Windows 2000 TCP/IP, the best-selling Configuring ISA Server 2000, and ISA Server and Beyond. Page 3 Copyright ©2006 CNET Networks, Inc. All rights reserved. For more downloads and a free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html
4.
10 dumb things
IT pros do that can mess up their networks Additional resources TechRepublic's Downloads RSS Feed Sign up for TechRepublic's Downloads Weekly Update newsletter Sign up for our Network Administration NetNote Check out all of TechRepublic's free newsletters "Confessions of an IT pro: My nine biggest professional blunders" (TechRepublic download) "The 10 biggest mistakes IT managers make" (TechRepublic download) "10 essential competencies for IT pros" (TechRepublic download) Version history Version: 1.0 Published: August 23, 2006 Tell us what you think TechRepublic downloads are designed to help you get your job done as painlessly and effectively as possible. Because we're continually looking for ways to improve the usefulness of these tools, we need your feedback. Please take a minute to drop us a line and tell us how well this download worked for you and offer your suggestions for improvement. Thanks! âThe TechRepublic Downloads Team Page 4 Copyright ©2006 CNET Networks, Inc. All rights reserved. For more downloads and a free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html
Jetzt herunterladen