Wednesday, February 13, 2013

Brookline High 30 YEAR REUNION "Class of 1982"


The Brookline High School class of 1982 recently had our 30-year reunion. The union was held on June 30 2012 at the Hyatt Regency hotel in Cambridge. We had a fantastic venue with an outdoor patio overlooking the Charles River. The dance floor was sunken and overlooked the Boston sky line, what a great venue.  A big shout out and thank you to the Hyatt staff that did a great job!

Leading up to the reunion, the reunion committee worked very hard planning and organizing the event and festivities.  We had a fantastic reunion committee:Jonathan Brock, Deb Thomas, Laura Finkel,  Daniel Mirel, Tania Hood, Matthew and Sonja Dahlberg. Many other classmates provided additional assistance and much needed support!

When planning an event, the most difficult part is getting the ball rolling. After surveying the class we decided to have a summer reunion. The summer worked for most people,  but classmate were not able to make it. The cost of the reunion was kind of high as weak economy was noted. Some classmates told us the ticket prices where to high, which hurt the over all turn out. Besides the challenges we faced, we made the event a huge success.


One of the major decisions we had to make was concerning a reunion social mixer.We decide to have a meet and greet at Golden Temple.  We had a private function room and enjoyed drinks while meeting classmate. It was great getting reacquainted  with every one, some who we hadn't seen in years.

During the planning phase and while working with the reunion committee team, I researched and developed skills in event planning and project management. Both of these skills have high value in the business market. If we pulled off a successful reunion we could consider our selves project and event planning experts. Based on the feed back we got from our classmates, the reunion was a great success.





The organization of the reunion was made easier using Facebook.  Annika Picker Frisk got the ball rolling by creating BHS Class of 82 page. We did a lot of organizing and communication via Facebook and email.
The reunion week end festivities started with meet and greet at the Golden Temple in Brookline as previously notes.  The event was well attended (some classmates came who were not able to attend reunion). The night of the reunion we had such a great time: drinks, dinner, and dancing. Hustle Simmons (Cory Hill) a graduate of BHS did the DJ and spun our favorite songs from the 80's.   It was great getting together with friends and every looked fantastic! 



In honor of the event and classmates who could not make, we took elementary school group shot photos.


We had an on going photo contest to determine who could capture the best shot and moment. After analyzing all the shots, we could not come up with clear cut winner. All the shots were great and every one looked pretty sexy. 


We also would like to thank everyone who made our reunion such a memorable event! The BHS Alumni Association was great especially Stan Goldberg ‘60 and Lynda Ritter Kirby ’79 for providing assistance and support. Lastly, we would like to give a shout out to class of 81 as well! 






Looking forward to seeing every one at our next event.

The 30 year reunion was special as we reached many mile stones: hopefully successful career, raising families, and seeing our kids off to college. What a year!

Best wishes and hope to see every one soon!

Tuesday, December 25, 2012

Merry Christmas

Hope you all have a great day and are touched by the miracle of Christmas. Best wishes on this joyous occasion!




Monday, December 10, 2012

SharePoint 2007 Database Migration process


My client was in a position where the entire SharePoint database needed to migrate to a new server or a larger drive. The system drive  was completely full. We had to come up with a solution to move all the data and minimize and potential data loss.

The first step is to use SQL management studio to ensure you have a good back up of all your databases. Once this is done you can easily restore database if need be.

Additionally, to ensure no users are trying to access SharePoint databases, stop all Windows SharePoint services using run  and service.msc. Also all of the application pools should be stopped along with SharePoint web sites in Internet Information Services.

The next step that has to be completed prior to moving databases, taking databases off line and detaching prior to any move sequence. Open SQL management studio and select the database you need to take off line.  (You want to make sure no users are on SharePoint).  Right click database and select detach and drop.
The last step is to physically move the database to a larger drive or another SQL server. This can be accomplished by copying data or restoring to new location.  Repeat step by attaching databases and restarting all SharePoint services and Internet Information Services web site.  Project complete along with happy client.

Monday, November 19, 2012

The economics of Bain, cheap profits

Bain Capital out sources 170 US jobs to China . Sensata Technologies which is owned by Bain Capital recorded net income of $355 million which was a 16% increase over 2010.

Despite the hard work of the 170 employees who helped build the company, their jobs are being sent to China. (The factory is set to close December 2012). The move of the factory from  Freeport Illinois to China is projected to generate modest profits for Bain partners. Additionally under current corporate taxes laws, they will get a small tax break for relocating to China.

(US workers protesting  a factory closing, moved to China)

Companies that send US jobs over seas should not get any tax breaks. Additionally, it is projected that some taxes will be deferred on income generated over seas. The fact that some US companies have no goodwill towards it workers should not be over looked. The executive teams, stock holders, and investors who influence these decisions need to be held accountable.  US workers and citizens need to continue to protest such actions, publicize such actions, and vote with your dollars where possible. As people who are being affected by such decisions say, "enough is enough".

In the current economic climate,  the US economy needs to produce more jobs and sustain growth. We need to support corporations that value their workers as opposed to those who value cheap profits at the expense of the US as a whole.

Wednesday, October 24, 2012

Wild Ride Technology Forrest

We are now in fall of 2012 and getting close to snow boarding season. I have been giving some thought to getting some new snow boarding gear!  The other night I went out to dinner with the family and did some shopping in the South Shore mall.

We went to North-face to check out snowboarding pants and video cameras. I always thought North-face gear was nice but  kind of expensive. I checked out the snowboarding pants and they seem reasonably priced around $250.   I checked out the Go-pro  video camera and think there pretty cool. After browsing for a little while, we decided to leave. 

While outside the store, I notice the increasingly popular bar code on the entrance window.  I promptly down load Bakodo bar code reader  from App store and  scanned the bar code. I then down loaded The North Face mobile application to my Iphone. I can now easily review all the snow boarding pants, check price,  and user reviews.

I find it amazing how far technology has come.  I plan on purchasing some cool new snow boarding pants and a mobile camera to document my Wild Ride through the technology Forrest. Make each run your best!

Wednesday, August 29, 2012

A mysterious email beware!

Over the last 10 years we have made the switch from letter and phone correspondence to email overload.


Since email is so prevalent, email administration is critical.

As email has proliferated, spam and spyware has increased. Many email servers have been compromised by the ability of an email server to receive email from an unknown sender and then
sending it on to a recipient or recipients, which could number in the thousands, that are
not users of that email system.

The protocol responsible for relaying is called SMTP or Simple Mail Transfer Protocol. This protocol belongs to the TCP/IP family and is used by email servers to transfer email from the senders email server to the recipient or recipients’ email server or servers.  The default port that it works on is port 25.

 SMTP is used to relay email from the host to the recipient’s email
server.  A company that has an open relay can caused spam related issue,
so closing this loop and controlling relay is critical.  This is done in different ways
depending on the email server platform.   To get a detailed explanation of the SMTP protocol and how it works see the Internet Engineering Task Force’s (IETF) Request for Comments (RFC) 821 and 822
located at www.ietf.org.

You can check for relay by telnet to your email server using the following command:

telnet [server name] [port number]
The server will reply with a 220 message indicating that it is ready.  Other commands
that you can use are HELO, MAIL FROM:, and RCPT TO.
The greatest threat comes in the form of Unsolicited Commercial Email (UCE) or SPAM.
Besides being very annoying SPAM has been and is becoming a very big problem, with
some very serious side effects, for the Internet community.   It has become such a
problem that the IETF released RFC 2505 “Anti-Spam Reco


Sending a large amount of SPAM , it could cause a
Denial of Service (DoS) situation where the server is over loaded and can not process valid email.    Also if the server has  issues processing email, the hard drive can fill up causing server to crash.

One of the side effects of having an open relay and sending spam is getting black listed. The two domains that blacklist companies are Comcast and Barracuda networks. You illegitimate email will not get delivered and subsequent user complaints will follow.  You will have to go through a process of rectifying the SPAM issue then requesting to be removed from domain blacklist.  These blacklist
databases are used by many organizations to block UCE from getting into their email
systems.  Two well-known organizations are Open Relay Behaviour-modification System
(ORBS) and Mail Abuse Prevention System(MAPS).  More information about these two
organizations can be found at www.orbs.org and www.mail-abuse.org respectively. This
can start to cause you as the email administrator some serious problems with your users
as they will be unable to send their email to any of the domains that has your server on
their blacklist.

Another serious issue related to this problem is spam email are generally done to spoof people in to providing confidential information especially credit card numbers. There can be some legal obligations to correct corresponding issue as quickly as possible.  For a good legal reference on UCE in the United States (Federal and State), European Union, as well as many other countries check out www.spamlaws.com.

Reference Security CERT RFQ:
Exchange Server
In this section I will detail the process of configuring Microsoft’s Exchange Server as to
preventing it from being an open relay server.
Exchange Versions
With versions of Exchange Server below 5.0 it is impossible to configure the server to be a secured relay.  If your Exchange Server version is below version 5.0 the recommended
path is to upgrade to at least Exchange server 5.5 Service Pack 2 with the encapsulated
SMTP relay address patch.  If  you are running Exchange Server 5.0 you are able to stop
the open relay function but you have to disable POP3/IMAP.   This version of the software should also © SANS Institute 2003, Author retains full rights

Internet Mail Connector
The Internet Mail Connector (IMC) is the service that is installed to allow your Exchange
Server to act as an SMTP server.  By default this service is not installed during
installation, instead it is installed by running the Internet Mail Wizard after the exchange
installation is complete.  To run the Internet Mail Wizard go to  File ‡ New Other ‡
Internet Mail Service.  By default the wizard does not put any controls on who can use
your Exchange server as a relay.  After you have your Exchange server installed with the
default settings of Internet Mail Connector service your exchange server is vulnerable to
open relay.
Configuring Internet Mail Connector To Stop Open Relay

Since all the configuration changes happen in the IMS, the first step is locating the
properties for the service.  Open your Exchange Administrator program and connect to
the Exchange server that has the IMS service installed.  You will notice that the
Exchange Administrator is set up just like Windows Explorer with Containers on the left
hand side and objects on the right hand side. Once open find the Connections container
located under your \\configuration container in the left hand 
column.   Once highlighted you will notice connector objects on the left hand side, one
should be named Internet Mail Service ().  You can view the IMS 
properties by double clicking on it.  Once open you will see several tabs, locate the
Routing tab and click on it to view the routing properties.
The first thing you notice near the top of the properties sheet is the option of Do not
reroute incoming mail or Reroute incoming SMTP mail (required for POP3/IMAP4
support).  The obvious choice would seem to be the first, but, do not use it for your
system will not relay messages, but will receive them and then send a non-deliverable
message back to the return address of the message.  This is not good because first it put
undo burden on your email system by accepting potentially very large email messages
but could also be used as a reverse UCE attack with your system involved.  The best
selection here is the second selection.
Next you see a box titled Routing.  On the right hand side of the screen select the add
button.  In the ‘email sent to this domain’ enter your domain name.  Next select the
option ‘should be accepted as “inbound”’ indicating that these are the only domains that
the SMTP server will accept mail for.
After you have set all of the domains that your server will be accepting mail for click on
the ‘routing restrictions’ to open your ‘routing restrictions’ properties page.  The first
option is ‘Hosts and Clients that successfully authenticate’ which allows relaying of messages to only users that have accounts on your server or another way to validate who
the user is with the server.  The next option is ‘Host and Clients with these IP
addresses’.  With this option you can specify by IP address who is allowed to relay
through your system or what subnet is allowed to relay through your system.  For
example a single IP address would put in their address and the subnet mask of
255.255.255.255.  For a subnet you would specify the network portion of the IP address
and let 0 represent the client addresses with the subnet mask to match.  The next option is
‘Hosts and Clients connecting to these internal addresses’.  What this does is allows
relaying of clients who can access a specific interface on a multi-homed system.  Do not
check this unless you have reason to do so.  And the last option you have to prevent open
relaying through your Exchange server is ‘Specify the hosts and clients that can NEVER
route mail’.  This option is pretty self-explanatory and works by denying specific IP
address or subnets.
After all the changes have been made to secure your SMTP server you have to stop and
restart the Microsoft Exchange Internet Mail Service located in the services on the
control panel.
This concludes my paper on Open Relay and configuring Exchange server to not being an
open relay system.


References:
Edwards, Mark Joseph. “Who’s Using Your Mail Server?.”  31 Aug 2000
 http://www.windowsitsecurity.com/Articles/Print.cfm?ArticleID=15480  (10 Oct 2000)
Howard, Mark. “Coping with Unsolicited Email” 1 Oct 1999
URL:http//www.exchangeadmin.com/Articles/Print.cfm?ArticleID=6174 (10 Oct 2000)
Microsoft. “Inside Exchange Internet Mail Service” 2000
URL:http://www.microsoft.com/exchange/techinfo/InsideIMS.htm” (10 Oct 2000)
Minasi, Mark. “Untangling Email” 1 Apr 1998
URL:http://www.win2000mag.com/Articles/Print.cfm?ArticleID=3024 (10 Oct 2000).
Reavis, Jim. “Are you an accidental spammer?” 23 Aug 1999
URL:http://www.nwfusion.com/newsletters/sec/0823sec1.html?nf (10 Oct 2000)
Redmond, Tony. “Exchange 2000 and SMTP” 9 Feb 2000
URL:http://www.win2000mag.com/Articles/Print.cfm?ArticleID=8140 (10 Oct 2000)
Toombs, Douglas. “Junk Email – Protect your Exchange Server from Junk Email.” 1 Aug
2000 URL:http://www.winntmag.com/Articles/Print.cfm?ArticleID=3673 (10 Oct 2000)



Monday, May 28, 2012

iPhone Suri sexy librarian

I had my iPhone 4S for about 5 weeks. sure it is nice and Siri is intelligent and I envision her as a sexy librarian. By no means am I blown away by her as opposed to my Android device. I was really bummed out when I was late for an appointment when the GPS sent me to the wrong destination like three times. Wow, I thought; is she really going to let me down like this?

I came to the conclusion that my iPhone was like a new adventure that would eventually please me. Is it the best thing in the world? Not really, but we are going to make the best of it!  Still I am on a learning curve!