It might surprise you to know that making your own ethernet patch leads, cabling up ethernet sockets, in-wall or not, if, any part of it is, or can be, used on a telecommunications network, including accessing the Internet via any means at all - inclding any RF means, such as WiFi, 3G etc, is, in our wonderfully over-regulated nanny-state country, illegal.
This was however once legal, until changes were pushed (likely by industry), and the Cabling Provider Rules were introduced, previous to the CPR, there existed the Digital Data Exemption, which amongst many things made it legal for anyone to carry out such activities, paid, or hobbyist, and had been in place since 1989.
The biggest problems with getting your Email to someone is getting through the receiving ends mail servers defences.
Sadly, long gone are the days of the early 90's where spam was really only something that was heard of in a supermarket, although it had been around for years, even on ARPANET and it was not of plague proportions like it reached in the mid-late 90's through to the problem it is today.
So, in light of Murdoch's staffs criminal actions, the worlds media have been filling our airwaves with the term Phone Hacking, why, I'll never know, as it is really incorrect, no phones were actually hacked at all, no conversations were monitored in real time, no phones contacts list or stored emails or photos were ever compromised in this latest scandal.
What is actually occurring is illegal access to peoples voicemail boxes. Most of us, and yes, I bet *you*, are still using the default PIN number for voicemail. Now, most of the time we don't need to know it, since the phone networks know who we are and just give us access, but, you do know that you can access your mobiles voicemail from any phone, anywhere, at any time.
Usually when your voicemail is first activated you will or at least should be, asked for a PIN, if you did not get asked for whatever reason, your voicemail box will be using the default PIN, in 99% of the time, that is simply the last four digits of your mobile number
For decades most Data Centre's utilised raised floors to inject cool air from underneath up to the racks in a back to back arrangement, this is called the Hot aisle Cold aisle method, but for some years now this method is considered outdated and rather inefficient for Data Centre cooling.
inefficient hot aisle - cold aisle approach
This method, as seen at left, involves hot air from hardware released from the rear door of a rack into the general Data Centre airspace, to assist with some form of hot air containment, most rows of racks will be so two rows are back to back, but, this still allows for hot air mixing with cold air as they are not truly contained for exhaust.
Many modern Data Centre builders have got it right in what makes far more sense using the all Cold aisle method, which involves an overhead plenum for the hot air to be expelled into, this means only cold air in your DC, and no mixing of cold and hot air, since the idea is to keep everything cool so your valuable hardware stays at a safe operating temperate. Continue reading "Data Centre Cooling"
In this day and age, I think it is wise that people use digital signatures with methods such as GPG/PGP to prove authenticity and using its encryption capabilities for privacy when storing mail on untrusted networks, such as those hosting mail in other countries, especially those countries who have questionable laws regardng privacy.
GNU Privacy Guard (GPG) is a free-software drop-in replacement for Symantec's proprietory PGP cryptographic software suite.
It is useful in many ways, from saying "Yes, I really sent that message", to using it to encrypt a message or files for privacy, to something as important as signing a checksum file, after all, what's the point of creating a checksum for a file, since if your machine is compromised, all they need to do is to recreate a new checksum and you're none the wiser, but this is harder to get around when it is also expected to be digitally signed by someone.