12 days of denormalization

On the first day of denormalization, my design gave to me

a really fast-running query.

On the second day of denormalization, my design gave to me

2 less tables.

On the third day of denormalization, my design gave to me

3 more indexes.

On the fourth day of denormalization, my design gave to me

4 larger disks.

On the fifth day of denormalization, my design gave to me

5 brand new reqs.

On the sixth day of denormalization, my design gave to me

6 times the locking.

On the seventh day of denormalization, my design gave to me

7 longer updates.

On the eighth day of denormalization, my design gave to me

8 more requirements.

On the ninth day of denormalization, my design gave to me

9 invalid rows.

On the tenth day of denormalization, my design gave to me

10 delays deleting.

On the eleventh day of denormalization, my design gave to me

11 questionable queries.

On the twelfth day of denormalization, my design gave to me

12 lessons learned.

Mobile device vulnerability at an all-time high

400 Percent Increase in Android Malware Found Since Summer 2010

SUNNYVALE, Calif., May 10, 2011 — In a global mobile threat study released today, Juniper Networks (NYSE: JNPR) found that enterprise and consumer mobile devices are exposed to a record number of security threats, including a 400 percent increase in Android malware, as well as highly targeted Wi-Fi attacks. Through close examination of recent malware exploits, the study outlines new areas of concern and delivers clear recommendations on essential security technologies and practices to help consumers, enterprises/SMBs, and government entities guard against mobile device exploits.

With smartphones set to eclipse PCs as the preferred method of both personal and professional computing, cyber criminals have turned their attention to mobile devices. At the same time, the gap between hacker capabilities and an organization’s defenses is widening. These trends underscore the need for further mobile security awareness, as well as more stringent, better integrated mobile security policies and solutions.

“The last 18 months have produced a non-stop barrage of newsworthy threat events, and while most had been aimed at traditional desktop computers, hackers are now setting their sights on mobile devices. Operating system consolidation and the massive and growing installed base of powerful mobile devices is tempting profit-motivated hackers to target these devices,” Jeff Wilson, principle analyst, Security at Infonetics Research. “In a recent survey of large businesses, we found that nearly 40 percent considered smartphones the device type posing the largest security threat now. Businesses need security tools that provide comprehensive protection: from the core of the network to the diverse range of endpoints that all IT shops are now forced to manage and secure.”

The report, “Malicious Mobile Threats Report 2010/2011” was compiled by the Juniper Networks Global Threat Center (GTC) research facility, a unique organization dedicated to conducting around-the-clock security, vulnerability and malware research tailored specifically to mobile device platforms and technologies. The GTC examines increasingly sophisticated attacks from 2010 and 2011, such as, Myournet/Droid Dream, Tap Snake and Geinimi as well as the pirating of the “Walk and Text” application, new threat vectors for mobile cybercrime, and the potential for exploitation and misuse of mobile devices and data.

(more…)

Install par2cmdline on CentOS 5.x

This has been bugging me for a while.

So, here’s a quick and easy way to do it:

Code:

wget http://garr.dl.sourceforge.net/sourceforge/parchive/par2cmdline-0.4.tar.gz

wget http://sage.math.washington.edu/home/binegar/src/par2cmdline-0.4-gcc4.patch

tar zxf par2cmdline-0.4.tar.gz

cd par2cmdline-0.4

patch <../par2cmdline-0.4-gcc4.patch reedsolomon.cpp

./configure

make

make check

make install # Need to do this as admin

cd ..

\