Tom Howarth

Author's posts

WHITELISTING: WHAT IS IT GOOD FOR? WELL, ACTUALLY QUITE A LOT, REALLY

In 2002, Defense Secretary Donald Rumsfeld gave a speech about a lack of evidence linking the government of Iraq with the supply of weapons of mass destruction to terrorist groups. This speech was remarkable for one thing only, that being the inclusion of the phase “known knowns, unknown knowns, and unknown unknowns.” These concepts finally …

Continue reading

CHANGING THE GUARD: GOODBYE FLEX WEB CLIENT—HELLO HTML5, BABY

They’re changing the guard at Buckingham Palace. This is a major tourist attraction in London, and the changing of the guard happens every Monday, Wednesday, Friday, and Sunday, weather permitting. “Changing the guard” is also a well-known refrain used to signify the complete change of an environment. VMware is currently undergoing such a transformation with …

Continue reading

What the Windows CCleaner did!

CCleaner, a program owned by Avast, is the center of a major security scare. Why should you be worried? Well, this product is used by millions of Windows users worldwide to run maintenance on their registry and file systems on their consumer Windows machines. The product has had over two billion downloads in its lifetime, …

Continue reading

GDPR: What is it, and Why should I care?

GDPR is a new set of European regulations that, in a nutshell, set out to codify how a data holder should secure and protect any personal data that they hold. Further, it also codifies the rights of the individual regarding any data held about them. Of course, it being a European regulation, it is obviously a …

Continue reading

Round One in Social Media and First Amendment Rights

I recently wrote an article about a potential class action court case being brought against the President of the United States by the Knight Foundation. In the article, I posited that public servants who use their private social media accounts to make work-related statements may run the risk of causing their accounts to become public domain, considered …

Continue reading

NotPetya: First Strike in a Cyperwar?

The law of international conflict is clear on when and how a state may invoke a state of armed conflict between sovereign nations. For example, in the US, the power to declare war is reserved for Congress, regardless of the President’s position as head of the US Armed Forces. It also dictates the reasons for …

Continue reading

AWS Certified Cloud Practitioner – 1.1 Define the AWS Cloud and its value proposition

1.1 Define the AWS cloud and its value proposition Definition of the AWS Cloud Amazon Web Services (AWS) is a secure public services platform that offers a number of services including compute power (EC2), database (RDS), storage (S3), and other functionality to help businesses scale and grow without the need to own phyiscal hardware or …

Continue reading

AWS bits and pieces – my journey to Certification

What is AWS? Amazon Web Services or AWS is the worlds leading provider of IaaS public cloud.  it is also  not a single thing, it is made up of many different services, and is accessible from several locations across the world these locations are called Regions.. Currently AWS has 18 Regions these are shown below. …

Continue reading

Error “Idm client exception: Error trying to join AD, error code [11]” when joining a VCSA to AD domain

This is not clear in the documentation, but if you receive the following error when adding your device to an Active Directory: Error “Idm client exception: Error trying to join AD, error code [11]” when joining a VCSA to AD domain  The root cause of this is because of incorrectly formatted entries in the details form. …

Continue reading

Tis the Season to be Jolly and heres a little Christmas Gift from Cormac and Duncan the VSAN Elves

Tis the season to be Jolly, and here is a little festive treat from Santa’s little VSAN helpers Cormac Hogan and Duncan Epping. Holiday gift: vSAN Essentials book available for free or from vSAN Essentials e-book is now free VSAN as we know is VMware Software defined storage solution that is integrated at the VMkernal …

Continue reading