McLean IT Consulting

WORRY FREE IT SUPPORT

Call Us: 250-412-5050
  • About
  • Services
    • IT Infrastructure Design
    • Remote & Onsite IT Support
    • Disaster Recovery
    • IT System Monitoring
    • IT Audit
    • Documentation
    • Medical IT Solutions
    • Wireless Networks
    • Cloud Computing
    • Virtualization
  • Partners
    • Lenovo
    • Ubiquiti Networks
    • Dragon Medical Practice Edition (Nuance)
    • Synology
    • Drobo
    • Adobe
    • Bitdefender
    • NAKIVO
  • Contact
  • Blog
  • Remote Support

Buying Or Selling A Business? Perform Due Diligence Technology Audit

March 20, 2011 By Andrew McLean Leave a Comment

When purchasing or selling a business, one largely overlooked procedure that is perhaps equally important as a financial and legal review (and often one effects the other) is a technology audit. This should be performed by a third party and never by the staff of the business to be audited – for obvious reasons. Most would agree that businesses rely heavily on computer systems to perform daily operations, so ignoring this vital part of the equation would be a mistake. Here I will discuss questions that should be asked and answered as part of the discovery process.

Step 1: Hardware

Taking inventory of technology assets such as PC hardware, printers, and network equation is the first step. How old is the hardware? Are all  the systems different? Were they purchased at different times or all at once? Are they on a life cycle – and if so, are they reaching the end of that cycle? What kind of fault tolerance do the systems have? Are there proper backups? Is there a server? Is it being utilized efficiently? Is there a high failure rate of existing hardware? What network hardware supports the environment? Is it secure both physically and from the internet?

Step 2: Software

Software audits may be even more important and if rushed can be disastrous. Are all systems the same OS or is the environment mixed? Are they updated consistently with security patches? Are they protected by antivirus and antimalware systems? Does the business run behind a firewall? Is access to sensitive information limited to specific users or groups, or is information security loose and trusting? Is the server properly maintained? Is all the on-site software licensed correctly? This last question is especially important for mid-sized businesses that have experienced rapid growth, as they typically struggle to maintain IT compliance to match business expansion, and Microsoft notoriously audits these types of enterprises.

Step 3: Other Assets and Liabilities

Does the business in question have outstanding contracts or obligations to IT professionals? This goes hand in hand with a financial audit, but it should still bears mentioning. The business website, if applicable, should also be considered. Does it look good or is it abhorrently ugly (thus driving away potential clients)? Is it maintained properly? Does it adhere to modern web standards? Are their security risks associated with it (i.e. private client information accessible online)? Are there broken links or functions?

These are just a few examples of questions that should be asked when looking at a purchasing or taking over a business.

Even a short investigation will reveal a clearer picture of the true assets and liabilities involved, and can at the same time identify possible improvements and cost savings before acquisition.

Filed Under: Editorial

Email Spoofing: Are You At Risk?

March 15, 2011 By Andrew McLean 1 Comment

I often receive messages from concerned parties stating that their email account has been hacked or compromised, or that there is a virus infecting their system. They come to this conclusion based on the messages bounced back from "mailbox not found" or "unknown address", AKA the 550 error – but these returned messages were never sent in the first place.

The sad truth is, one need not hack,corrupt or subvert an email account in order to use it. Just spoof it.

Yesterday, I received one such message from a friend, who of course worried he had a virus. I asked him to forward the returned message to me so that I could analyze the header information codes and perhaps trace the source. I traced it back to a legitimate-looking site and I notified the technical contact in charge of the hosting, which is about all I can do to resolve the end on that side. Afterwards I notified my friend that his account was not corrupted and I would demonstrate what happened.

I threw together a PHP script that took me literally less than 30 seconds, and with it I sent him a spoofed email both from and to his own address.. I could have sent him an email from any name and account. Any number of celebrities would have made an interesting analog, but I decided impersonating him would best fit the spirit of the spoofing demonstration.

I’ve said for years that email as a technology wasn’t well thought out, and in its current state is broken. According to RSA, over 260 million malicious emails are sent to consumers every day impersonating a trusted company in attempts to lure them into installing malware or handing over private account information. Gartner Inc. estimates the direct costs of repairing the damage from phishing{{1}} and spoofing{{2}} at $3.6 billion a year.

Imagine for a moment that I unscrupulously wanted to destroy someone’s reputation with the same PHP script I wrote earlier. All I would need is to know some of his contacts (or business contacts if I were feeling particularly nasty). From there, it would be too easy to send abusive spoofed messages to friends, family, or random people which could at the very least add him to publicly available spam blacklists, and at worst, lose him friends and clients.

There is a clear and present danger with it comes to electronic communications identity.

So how do you protect yourself from spoofing?

The most current technology standard in the battle against email spoofing and spam is something called SPF, or "sender policy framework". To see how this works, here’s a bit of background info. When sending an email, servers communicate similar to the way people do. They greet each other, identify themselves, and continue with the conversation (email transmission). But one can force a server to lie, or at least to distribute a lie. When someone sends an email, it goes from their outbox to their server, which then passes it along to the recipient server who passes it to the final destination. Unless security measures are in place, this is essentially all that happens and nothing prevents anyone from masquerading as anyone else. SPF allows servers to ask two questions: "are you really who you say you are?" and/or "are you authorized to speak on their behalf?". So when server X identifies itself as ALPHA (even though it is not), server Y will look up the real ALPHA and ask for its SPF record to see if the impostor’s IP address matches who it claims to be. Since it is not, it will reject the message.

What does it take to create an SPF record? About 30 seconds of work and access to your domain’s DNS server. When finished, it looks like this:

v=spf1 mx mx:servername -all

That’s it. One little txt record in your DNS settings.

The main failing of this measure is for it to work, it requires action both by the sender’s domain (or server host) and the receiver’s. If one wishes to protect their address from being spoofed, one must create an SPF record for their domain. To protect your domain from receiving spoofed messages, the email server must be configured to look for those SPF records. Any failing on either side makes both vulnerable.

Ultimately, the answer is obvious: SPF records MUST be a standard procedure for all domains and email servers (both hosted and internal). Without it your brand is extremely vulnerable.

[[1]]From Wikipedia: Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to fool users, and exploits the poor usability of current web security technologies.[[1]]

[[2]]From Wikipedia: E-mail spoofing is e-mail activity in which the sender address and other parts of the e-mail header are altered to appear as though the e-mail originated from a different source. Because core SMTP doesn’t provide any authentication, it is easy to impersonate and forge emails.[[2]]

Homepage feature image courtesy of empty_inbox.

Update: TechRepublic released a supporting article dated April 11, 2011. http://www.techrepublic.com/blog/security/identity-theft-businesses-are-at-risk/5324

Filed Under: Editorial

Virtualization: What Is It? Why Use It?

March 8, 2011 By Andrew McLean 1 Comment

What Is Virtualization?

In the IT sense of the word, anything “virtual” is a representation of something that does not physically exist. Virtual Private Networks (VPN), Virtual Memory, virtual reality, virtual game worlds such as that of World Of Warcraft, and of course as it pertains to this article, Virtual Machines (VMs).

Virtualization is the act of separating operating systems and software from the physical hardware it runs on by placing an abstraction layer between them. Put simply, it turns the “computer” into an ethereal state that isn’t tied to the physical confines of the hardware.

Why Virtualize?

Take for example the images below.

Before Virtualization

After Virtualization

On the left we see the concept traditionally applied to general computing. Applications run on the operating system which runs on the hardware. Efficiency is quite low and in most cases the processor would be idle 80-90 percent of the time. Backups must be made to an external disk or network location from within the context of the computer it is backing up, subjecting it to potential configuration errors and faults. Adding hardware may require that the system be powered down on-site and physically maintained. If usage requirements change, system resources cannot easily be altered or redistributed.

On the right, VMware is acting as the virtual abstraction, separating and acting as a liaison between multiple hosted applications and operating systems, and the hardware itself. In the second example, available processor cycles are distributed between multiple operating systems running in tandem on the same computer hardware, thereby improving efficiency. Each VM can be paused, backed up and started outside the confines of the individual system. Memory, network devices and even storage can be added or redistributed (and even remotely) without interrupting the operations of the Virtual Machines. If the host hardware fails, the VM images can be migrated to a new physical host without regard to drivers or capacity. Virtual machine images can be placed in any state in standby, allowing new, fully installed and configured server images to be activated within seconds as needed.

Not only can the hardware host multiple Virtual Machines, but also many different operating systems. Some businesses require many different operating systems for separate departments and software necessities. One company might need both a Microsoft Server 2008 domain controller but also a Red Hat Linux web server. Once upon a time, that company would have to bite the bullet and invest in two separate hardware servers. Now, all this is possible on a single server.

A few years ago I held a position as a network administrator in charge of maintaining approximately thirty servers (most virtualized) at any given time, and virtualization afforded me flexibility and fault-tolerance that was otherwise not possible. When testing a patch or other general system change, it was easy to click a button to save the system state, then make a change. If anything other than the desired result happened, I clicked another button and went back to the way it was before in a matter of seconds. The value of this “undo button” cannot be overstated.

Things To Consider

The IT world changes so fast sometimes that it takes a while for it to catch up with itself. Virtualization has been around for years but traditional software licensing restrictions struggled to fit the concept of virtualization with accepted definitions of a “computer. Microsoft originally defined a license as being permitted to run on a single CPU. Then, when multiple CPU computers came about, they had to revise the wording. Then again when virtualization came along, Microsoft at first required that a new license needed to be purchased for every “instance” of their operating system. Microsoft eventually rethought the entire licensing structure and loosened restrictions enough to allow unlimited virtual machines provided the top-level host operating system was the Datacenter Edition of Windows. What’s more, Microsoft went a step further and released its own virtualization software known as Hyper-V, a variation of the term HyperVisor, the basis of which the virtualization technology came into existence.

Microsoft’s Hyper-V is available as part of the Windows Server 2008 system, and VMware’s VMware Server 2 is available for a free download for relatively simple infrastructure. More robust options are available for additional licensing fees.

Filed Under: Technology

Cloud Computing: What Is It? Should You Be Using It?

March 6, 2011 By Andrew McLean 4 Comments

Unless you’ve been living under a rock for the last couple of years, you’ll have heard of “Cloud Computing”, but recent studies have suggested as many as 40 percent of IT professionals are bewildered by the concept of Cloud Computing and its varied definitions. Advertisements say you want it. Big business agrees. But what is it and how can it help your business? Does it live up to the hype?

What Is Cloud Computing?

The simple truth is we’ve been using “Cloud Computing” or “software in the cloud” for years. In years past, if you as a business intended to use a web application, you were required to either purchase a server and deploy the application yourself, or alternatively rent hosting space from a web host and deploy the application there. Services such as Hotmail, Google Docs, Office Live, MobileMe and Flickr are examples of cloud software everyone has been using for years. What defines these is that you are not required to “own” any IT hardware or software to use them, but the information  held therein is entirely your own. To host your own email services as a business, you must have the IT infrastructure and the know-how to use it. The same is true of services like Flickr which doubles as both an image-centric social network and also a “cloud storage” service, effectively backing up all of your images safely off-site. These technologies are a subset of Cloud Computing called SaaS or Software As A Service. I myself have my company email hosted by Google Apps which gives me the ability to access my own email with my own domain (@mcleanit.ca not @gmail.com) from any Gmail interface. This affords me the ability to have an inbox of up to 7.5 GB of inbox storage space at the time of this writing and frees up my precious web server storage space to do what it does best: serve and store web content.

Why Use The Cloud?

One analogy I’ve heard and think fits well is “if you only need milk, why buy a cow?”. The advantage of Cloud Computing and/or SaaS is that instead of purchasing, licensing and maintaining on-site servers and software, companies can cut serious expenses in those areas. Instead, applications are run and shared from a centralized location over the internet. Corporate data centers are dramatically underutilized with servers typically idle 85% of the time, but this is done to afford the potential of increases at peak times (such as the holiday season) so the system can handle unexpected surges of traffic. Cloud computing allows a business to pay only for what they use. When leveraged correctly, this can almost entirely offload the overhead costs involved in providing IT services to employees or clients. All that remains is the cost of the service.

In the example of Google Docs, this SaaS can theoretically replace the need for desktop applications such as Microsoft Office or OpenOffice, and has the added benefit of being accessible anywhere with an internet connection, as opposed to something stored locally on a work computer, which generally isn’t accessible remotely (unless made so by online storage SaaS such as DropBox). But Cloud Computing and SaaS don’t stop at desktop applications and remote storage. Service exist that encompass HR, billing and invoicing, CRMs (Customer Relationship Manager), employee training and web conferencing.

The other side of Cloud Computing is Utility Computing. Companies like Amazon, Sun Microsystems, and IBM, who offer storage and virtualized servers that IT departments can access on demand. These virtualized network devices are accessible via the Internet “Cloud” and integrate seamlessly inside your business network via VPN (Virtual Private Network). Other commoditized services include centralized firewall and centrally managed antivirus systems. With all the buzz going on, more services and utilities are going “to the cloud” all the time.

visual representation of cloud systems

Why Might You Avoid The Cloud?

The marketing pitch and the fervor in which it is given would indicate these are simple turn-key business solutions, but they are certainly not appropriate in every case. The hype machine says “Lower your TCO and rollout time using Cloud Computing”. But the truth is, even as outsourced, virtualized utility IT infrastructure, the complexities of the technology don’t disappear simply because they are hosted “in the cloud”. A service as simple as email hosted and maintained by a company as big as Google can suffer disastrous mistakes. Less than two weeks ago, Google (by way of a software update and a bug therein) accidentally lost or deleted 150,000 email accounts (effecting less than 1% of Gmail users). It should be noted that Google had backups and restored the accounts and emails to all users but it took several days to do so. More advanced services have even more potential for similar issues.

Of course, hosting this infrastructure internal to your enterprise has the same potential for issues but there is a large perceptive difference between being internally responsible for mistakes, and being let down by an outside service provider. Businesses are inherently more forgiving of themselves than to outside service providers.

Furthermore, many SaaS products still require an “Administrator” who can hold certifications to maintain the service. But when new features are released, administrators are forced to re-certify with an exam, and this can happen 3-4 times a year! In fact the push for Cloud Computing and SaaS is increasing the sophistication of systems because of all the underlying technologies required to integrate it seamlessly with existing infrastructure.

Is Cloud Computing Right For You?

All businesses are different and of course so are their needs. A local service business may not benefit from cloud-based firewalls or virtualized server clusters as a large enterprise might, but perhaps a hosted email solution or online invoicing systems are simple and viable service options. As always business requirements will dictate whether Cloud Computing is right for you.

Image courtesy of centralasian

Filed Under: Technology

Be OS Agnostic

March 6, 2011 By Andrew McLean 1 Comment

A few weeks ago I was helping a friend take care of a hardware problem with his MacBook Pro, which I determined would be covered by Apple (despite being several months out of warranty). I called two local Mac-centric stores, the first of which didn’t answer their phone after repeated attempts, and so it was obvious they didn’t want Apple’s money and therefore I moved onto the next. They were friendly and helpful as I expected and so together my friend and I went to this store and while he spoke with the service desk, I stood back and observed and waited within earshot in case I was needed for assistance.

While he was taking care of his issue, a woman came in with her iMac, and I overheard her telling another technician the problems she was experiencing. I could tell immediately it was a software configuration issue with her Email client, which was Microsoft’s Entourage. To my horror, the tech promptly told her that they don’t support Entourage because it’s old and nobody uses it anymore, and because it’s a Microsoft Product.

Despite not being in a position to help the woman (and the impropriety of soliciting business while inside a store providing a similar service), I was quite irritated to say the least.

I was formally trained on Microsoft’s Windows operating systems, and I hold a number of certifications that cover them. But to make an excuse like he did would be like me saying I don’t support Apple’s QuickTime software or iTunes because they’re Apple products. Besides which, Entourage is by no means an old obsolete Email client.

I’m often asked which computer is better: Mac or PC? Typically those asking such questions won’t even consider Linux as a viable option. But it is a loaded question. It is a question I cannot answer, because I would say “both”. Each one has their benefits and limitations, and each have their place. Even Linux has some very user-friendly and viable options freely available.

Personally, my desktop (and not coincidentally the computer I’m using to type this) is a Mac Mini. I use this computer for all my web development, writing, billing, research, database development, and media authoring, and I find the software for most of those tasks to be equal or better for Mac OS X. For example, I am currently using Twitter’s first party Twitter app for OS X that I downloaded from Apple’s App store. No such first party software exists on the Windows platform. Conversely, my laptop is a Windows 7 Dell XPS 1530, which affords me more versatility in software options and configurations. Many of the tools I use as an IT consultant are more readily available or easier to use for Windows. It is near impossible to find a Mac equivalent for some tools I use. For the average user, however, I can see the draw to Apple.

My other desktop, which is actually one I gave to my wife, is also Windows 7, but it can also boot up into Ubuntu Linux 10.04 “Lucid Lynx”, which has a great user-friendly interface and compelling options… and it’s 100% free and open source (foss). I keep a number of Ubuntu installations around so I don’t fall behind the technology, but most of my time is spent between Mac and Windows because those are the two computers I have most readily available.

Apple’s OS X tends to be more media-focused. With iMovie, GarageBand, and iWeb you can create a movie, dub it, give it a soundtrack and publish it to youtube or even your own blog, and admittedly when finished the end product will look, and sound, far better than anything Microsoft has yet released.

On the other hand, Microsoft tends to be more business and office-centric, with a focus on word processing, email, and centralized administration. Windows has built itself to meet the demands of current IT security measures and standards. One server can control thousands of client computers in an organization. This is a feat that OS X is still catching up on, however they are gaining ground.

For businesses requiring a full-featured server, the competition gets a bit more interesting.

A business owner recently asked me to provide a quote for a server which will initially serve as a simple file server, with more functionality possibly being needed down the road. My first response was to go over the Windows option because it’s the standard option, however when I crunched the numbers, the cost disparity between OS X Snow Leopard Server and Windows Server 2008 was a bit of a surprise. Windows was up to five times the price of the Apple option, but had fewer features, and would have required an additional fee for many of the features which may need to be added in the future. On the other hand, if the business were part of a bigger enterprise with restrictive IT policies, the result wouldn’t be the same, and to integrate OS X into a greater infrastructure would take a relatively significant amount of configuration to perform.

I don’t have a “favourite” operating system. It comes down to personal preference and what you need it to do. I do, however, support all of them.

Filed Under: Editorial

  • « Previous Page
  • 1
  • …
  • 9
  • 10
  • 11
  • 12
  • Next Page »

Contact Us

McLean IT Consulting Inc.
Serving Greater Victoria

P: 250-412-5050
E: info@mcleanit.ca
C: 250-514-2639

Featured Article

Synology – Move Application Between Volumes

When I set up my own Synology DS1815+, I created a large hard disk volume for most of my storage requirements. For the heck of it I had also created a … Continue Reading

Blog Categories

Our Mission

We seek to enrich and improve small and medium businesses by delivering best-in-class technology solutions, and offering a premier customer service experience. Contact Us Now!

Quick Menu

  • About
  • Testimonials
  • Contact
  • Blog
  • Sitemap

Let’s Get Social

  • Email
  • Facebook
  • LinkedIn
  • Twitter
  • YouTube

Copyright © 2025