Shadow

Blog

Microsoft Confirms and Pulls Latest Windows 10 Update KB4524244

Microsoft Confirms and Pulls Latest Windows 10 Update KB4524244

Blog, Recent Posts, Windows
A Windows 10 security update, KB4524244, released on February 11th, 2020 was pulled just days later on February 15th. In which case Microsoft confirmed user-reported issues. When Should You Update? When it comes to Microsoft and there updates to Windows 10 users have to decide when to update. Problems with updates are so common that some users won't update anywhere from 1 to 2 weeks after release. Is the issue the update is attempting to address so critical that any time not updating is a risk? OR Will not updating right away put my data or systems at risk more than a possible issue with the update release?
Behold An Ashen Horse

Behold An Ashen Horse

Blog, Recent Posts
Is this the preamble to some very dark days? The news is somewhat muted in their coverage of the Novel Corona-virus (2019-nCoV). Some videos on Twitter and Reddit are disturbing, yet seem almost unreal. It's almost as if the mainstream media in the US and Canada are taking the whole "Pandemic" reports in stride and low key. Even the official updates sound like fodder for a bad B horror movie where initial reports play in the background as chaos slowly erupts. Thank goodness we have Microsoft Teams, Team Viewer, Google G Suite, Office 365 and VPNs to work remotely should schools close and public gatherings become precarious endeavors. Of course, that's hopefully a ways off at this point, but it wouldn't be such a bad idea to have everything you need to work from home should the need ar...
TLS/SSL vs IPsec: The Trade-offs

TLS/SSL vs IPsec: The Trade-offs

Blog
A look into the trade-offs between TLS/SSL and IPsec in terms of their requirements, authentication methods, overall performance (speed and strength), service transparency, operational complexity, and other characteristics.  Authentication Methods: TLS/SSL begins with a Secure Sockets Layer (SSL) handshake process to agree on which protocol to use. Once a secure connection is created the next step is to exchange certificates and keys as needed.  IPsec is a network-level protocol that requires setup before on both servers and the client.  Overall Performance (speed & strength): As far as performance, TLS/SSL is faster, however IPsec setup in Transport Mode is getting close in speed. When looking at the strength of security, IPsec setup in Tunnel mode will be mo
R Shiny Application Split Into Multiple Files

R Shiny Application Split Into Multiple Files

Blog, Data Science, Recent Posts
An R Shiny application can be completely made of just one file that includes your UI and server code. Depending on the application you're creating this can get messy as the number of lines grows. Splitting the app across multiple files also helps with debugging and being able to reuse code for another project. For this post, the actual code and what it's doing will not be covered. The code is more of a placeholder and this is creating a project framework to start Shiny applications. Creating a new project The best practice is to create a new project for each application. This is simple with RStudio and using the "File" dropdown to select "New Project" Select "New Directory" Choose "Shiny Web Application" Give your directory a name and the location you want to save i...
Prepare for Rumors of War

Prepare for Rumors of War

Recent Posts, Blog, Linux
The news is ramping up on the potential for bad things happening. This not great timing for many computer users out there, whether it be for professional or amateur users currently in the middle of upgrading operating systems. With malware, viruses and ransomware in the media lately the addition of potential increases in cyber-attacks adds even more stress to the task of 24/7 system maintenance. On a user level, good housekeeping is essential, along with prudent patching, basic firewall and antivirus updating including routine monitoring. I have a little more confidence in my Linux systems, but Windows OS can be secured and protected if you put some time into basic system upkeep. Having a good backup procedure and preparation for system restore are always a priority for any true system...