All posts by peter

From cloudy to sparkling clear water

When we inherited our pool it was initially green. I have worked hard at getting the pool back into good shape. With zero prior pool maintenance knowledge and experience I began my adventure of getting the pool blue.  The initial work was not too hard but it did involve floccing and vacuuming the pool. The pool was then blue - however I never manged to get the pool water sparking clear. An over night clarifier would get the pool clear, but only for a couple of days, and then it would revert back Read more [...]

Peter & Kathy Solomon 2016 Reflections

Dear Friends and Family, Pete and I thought we would start the tradition of writing a Christmas letter to keep you up to date with what’s been happening in our lives over the past year. As you can see the letter is already a bit late. As we look back on the year that has past, we are thankful for God’s many blessings and His amazing grace. The year started with the purchase of our new home in Weltevreden Park. It is wonderful to have place of our own and something we can invest our Read more [...]

How to choose a good variable name

Before I get into this weeks topic of choosing a good variable name I have two notices below, then we will get right in. I have decided to change the scope of my blog from IT Security to IT Extraordinaire as I want to include a wider variety of topics which interest me, such as computer programming and Arduio development. I had some feedback on the post I did about trying to gain access to a computer. The point of the article was to show that there are ways to hack into computers, so you should Read more [...]

How we investigated the settings that were configured in a users registry

So a couple of weeks ago we had a strange situation where a certain user registry setting was being updated somehow.  We really did not know how to tackle this problem. The only clue that we knew was that some users were affected and some users were not affected. Eventually it was decided to take a 'non affected' user and compare their registry settings with an 'affected' user. To give a bit of background, we were hosting a shared application on a Windows 2012 server. The users were concurrently Read more [...]

How we nearly hacked and gained administrator rights to a computer.

In dealing with the topic of IT Security I thought that I would share the story of how a colleague and I nearly gained administrator control of a computer.  I say nearly, because it was possibly for us to have gained control of the computer, but it could have cost us our jobs, so we decided to rather wait a day and get the administrative rights to the computer the proper way. So my colleague and I were busy deploying software to a workstation which was part of the work that we had to do. But Read more [...]

How private is your internet browsing?

Well I missed posting a blog entry on Saturday, but I will make up for that now. Recently I started using Firefox, due to an error which I experienced in the Google Chrome browser and after the bug in Chrome was fixed I continued using Firefox. And then one day Firefox released a plugin called Lightbeam. Up until that point I was not aware that sites were able to track who you are, and what other sites you are visiting. Each site that you visit put's its tracking cookie on your computer, and Read more [...]

Password keepers, my thoughts…

Good morning everyone, So it's nearly a week since I got engaged. I got engaged on the day after Valentines day, I did not want to do it on Valentines day, so I did it on the Sunday evening after a lovely dinner at Melrose Arch. Last week my first blog post was successful, and I managed to get in some comments and a bit of discussion. The question that I got was about password keepers \ password stores, so I thought that I would write about my thoughts on that today. These days there Read more [...]

How to choose a secure password

Good morning everyone, today is Valentines day. So happy Valentines day. I did not manage to get up early to treat my special someone to a surprise visit this morning. But alas all is not lost, I will do something special for her a bit later. I have recently decided to change the theme of my blog to IT Security. I did an email course by a guy by the name of John Sonmez (http://simpleprogrammer.com) on how to create a blog. And this blog is the end product of the course, but yet the beginning of Read more [...]