How I saved $8,000 by being nice

On March 27,?I made an offer on a new condominium across town. It was priced just on the edge of what I could afford, but the location is great, and I really love the unit, so I decided to stretch myself a bit and make an offer. Across town, there was another very attractive condo?with a lot of pluses going for it, and it was priced significantly lower. However, it was clearly my second choice.
I really wanted to hedge my bets by submitting offers on both units, just in case one would be rejected, because?given how competitive the Boston housing market is, this was a high likelihood. However, since both sellers?wanted offers to be submitted by Tuesday morning, I didn’t really have any wiggle room. Also, there was a chance that the?offer on my second?choice would be accepted before my first one, that I would have to accept their?deal to lock it in, and then have my offer on my first choice to be ?accepted, causing me to lose my deposit or be stuck with?my second choice. Not cool!
Rather than taking this risk, I decided to put my energy into my primary choice. ?I sharpened my pencil, calculated what I could afford, and made my offer, settling at?5% over asking price. ?Finally, I wrote a short letter of introduction. As I said to my real estate agent, it wasn’t my best work, but I hope to that it would make a difference. What I wrote is below:

Dear <Seller's Name>,
I had the pleasure of visiting your condo yesterday during the open house, and I?m very interested in purchasing it. I love the layout and the location, and can easily see myself happily living there for some time ? especially if I have a private space to do my morning yoga routine in that awesome third floor space!
I understand you would need to find suitable housing before you could depart. To help you with this, you could continue to live there through July - which should give you ample time to find your new home ? as long as my basic costs for the property (mortgage, taxes, insurance, and HOA fee) are covered.
If there?s anything we can do to help come to a mutually-beneficial agreement, please let me know!
Sincerely,
Peter?Nikolaidis

Since?I had noticed that the seller practices yoga – as was evidenced by several yoga books throughout the condo, I decided to reference that, as I didn’t have much else by which to form a connection. Given how quickly the Boston real estate market moves, it’s not like I could say “let’s get together for coffee next week and go over what you want to get out of this transaction,” so I had to go with what little info I could gather. Also, since I the sale was contingent on the seller finding her own location, and I was not in a hurry to move, I decided to offer her an extended stay if she was not able to find housing prior to closing.
It worked! My agent called me ?in the afternoon to tell me that they had narrowed selection down to three offers, and that they wanted our “best and final.” This is a common tactic to squeeze a little more money out of the buyers, and why not? It works, doesn’t it? (Note, the last time I had bid on a condo, and ?was asked for my best and final, my response was “you already have it.”) I went back to the drawing board, sharpened my pencil? again,?and offered $2,000 more. ?Several hours crawled by?from that point. ?My agent called me back that evening to tell me that my offer had been accepted, even though someone else had offered $8,000 more than my final bid! ?I was told that the seller’s agent liked my agent the best, and that the seller really liked my letter of introduction.
The moral of the story is “pay attention,?communicate clearly, use every resource at your disposal, and be nice to people.”

An incident response team is like the Avengers

Today, after leaving a meeting, one of my junior analysts said “I guess we need to lower the threshold for declaring an incident.” Intrigued, I asked what brought him to that conclusion. He said “well, our incident response plan says that we organize the team if more than ten computers are affected, but you just said that an incident is any event that indicates harm or malice.”?Realizing that further clarification was required, I resorted to my favorite tools: analogies and metaphors.
Captain AmericaI gave the example of?Captain America hearing a car alarm going off. This is just an event, and not yet an incident. Why? Surely if a car alarm is going off, something bad is happening, right? No, not necessarily. It could have been set off by the owner by accident, by a teenager zipping by on his skateboard and accidentally slamming into the car, or another car bumping into it while parking. While these are all (noteworthy?) events, none of them represent an incident in the security context because nothing really bad was happening, and there was no evil intent.
This is the equivalent of an analyst detecting an alert on the corporate SIEM. The analyst notes that there are a large number of failed logons occurring on a system. Investigating, he finds that they are all originating from a single workstation, which was unable to log on due to a recent password change. Is this an incident? No.
Taking it to the next phase, let’s say that Cap does investigate, and he sees that the alarm was set off not by some passing skateboarder, but by a common street thug. Does Cap yell “AVENGERS, ASSEMBLE!?” No, not yet. Some two-bit thug trying to jack a car is well within Captain America’s ability to cope with without needing to call upon other members; you don’t call for Thor and Iron Man just because you’ve got them on speed dial, and Cap knows that.
This could be likened to the analyst detecting?malware on the affected system. Perhaps this?malware was trying a brute force attack against a random system on the network.?The analyst tasks the antivirus software to re-scan the system and do a cleanup, which it does successfully. Problem solved, with no need to bring on additional help.
Batroc the LeaperEven if the guy breaking into the car turns out to be Batroc, Cap doesn’t go crying for help, because he can has?handled?the likes on his own many times in his extensive career. But what if Batroc is not alone, and is accompanied by his brigade of super villains? This is where it gets a bit subjective. Being a seasoned incident responder, Cap is likely to attempt an immediate intervention in their nefarious activities, even though he’s outnumbered. However, if he starts to realize he’s being overwhelmed, Captain America is not too proud to reach out to a nearby resource like Bucky, the Falcon, or Spider-Man if he’s nearby. Since he has an established relationship with many other super-powered resources around the world, help is just a quick call away.
The analyst continues to investigate, and finds that there is malware on the affected system, and also notices alert that other nearby systems are apparently infected with the same malware. Contacting the department IT liaison, he finds that they are aware of the infection, which was passed around by a shared USB drive. Working together, the department contact and the analyst are able to clean up the malware before it spreads beyond the handful of machines.
UltronBut, let’s say that Cap notices it’s not just an ordinary thug, and not even just Batroc’s Brigade, but it turns out that, for some reason – don’t ask why – it’s Ultron who has decided to steal this car. As a villain who has tried to destroy the world, and come awfully close to doing so, this is immediately dubbed a very serious incident.
Further investigation reveals that multiple systems have been infected, and are communicating to an external IP address in a remote location. There is now evidence that classified data is being exfiltrated from the network. It’s time to call on extra help. The incident response team, consiting of members of the networking, server administration, and department IT?teams, are notified, and a command center is established. The team immediately begins to compare notes to determine what is going on, and how to contain the threat.
This is why?Captain America’s got not just Bruce Banner’s cell phone, Nick Fury’s SUV phone, and Tony Stark’s office number, but also Pepper Potts’ pager?(because she’ll be able to get a hold of Tony, regardless of what lady has caught his attention this evening). Cap also has a plan, which directs him to notify the regular members of the team.
This is why the incident response plan must be regularly updated to include a current list of contacts, the systems for which they are responsible, and their best contact methods.
Black Panther (Ultimate)If it turns out that things are getting really bad, he may need to call upon a specialist. For example, since Ultron is (these days, anyway) made largely of vibranium, it may make sense to call upon someone with extensive knowledge of the precious metal – good thing Cap kept T’Challa’s Whatsapp handle at the top of his favorites! Now the Black Panther is only a hop, skip, and a jump away from joining the team. If other threats are encountered along the way, say, it’s found that Doctor Doom may be collaborating with Ultron, more help – in the form of the Fantastic Four – may be called upon, as they have extensive experience dealing with Victor von Doom, and can likely help contain the threat in a timely fashion.?
The organization maintains relationships with law enforcement, their ISP, and outside security firms who can supplement the incident response team if required. Calling on a professional services firm to assist with containing an advanced persistent threat may be called for, as well as notifying law enforcement or various government agencies, depending on the nature and scope of the breach that has occurred.
Is every day in the life of a security analyst as exciting as that of an Avenger? Probably not. But it can be fun, at times, especially if you like being a hero. If you think you have relevant skills or information that could be useful in a security incident, let?your local security team know, and ask how you could be of help during a crisis. Who knows? You may just get a snazzy, new ID card to carry around.

Deadpool, Captain America, Black Panther, The Thing, Invisible Woman, Mister Fantastic, The Human torch, Iron Man, Thor, Hawkeye, The Incredible Hulk, Black Widow, Falcon, Ultron, and Batroc are property of Marvel Comics.

Review: Symmetry Series Folio for iPad Mini 4

Symmetry Series Folio for iPad Mini 4
Company: OtterBox
Price: $59.95
Symmetry Folio for iPad Mini 4
I recently had the opportunity to evaluate and review the Symmetry Series Folio for iPad Mini 4 from OtterBox. This is a protective, wrap-around folio style case. In keeping with their reputation, the case is not one of the slimmest you can get, but definitely offers a lot in the way of protection.
Installation is simple, but took me several seconds to get all of the corners tucked in properly. This was comforting, as I knew that, once snugly inside, my iPad was not coming out by accident.

Continue reading “Review: Symmetry Series Folio for iPad Mini 4”

It's Podcasting time again!

After a few years of regularly co-hosting a podcast (Fresh Ubuntu, and Pocket Sized Podcast), I’ve partnered with my friend and colleague Adam Bell to record and publish Blurring the Lines! On the show, we will take about our experiences with business, as well as our personal lines, and how they blur in the 21st century. We also will have interviews with interesting guests on how the lines between their business and personal lives blur, how they maintain separation, and how they embrace the intersection. Give us a listen, and subscribe! Right now!

The "Peter Diet?" No, it's the Slow Carb Diet

Recently, likely thanks to my weekly Saturday Binge Day posts on Facebook, several of my friends have been saying “I want to know more about that diet,” and also “I’m doing the same diet you are” or “my friend is doing the same diet you are.” My response? Yes/no.
Yes, you want to know more about it. No, you and your friends are not doing the same diet I am.
Continue reading “The "Peter Diet?" No, it's the Slow Carb Diet”

Review: Data Rescue 4

Data Rescue 4
Company: Prosoft Engineering
Price: $0 – $299
Data Rescue AwardI recently had the opportunity to review Data Rescue 4.2 from Prosoft Engineering, including a branded copy of their Bootwell USB thumbdrive.
From the publisher’s website: Data Rescue is hard drive recovery software that can recover your photos, videos, documents from:

  • crashed, corrupted or non-mounting hard drives.
  • accidentally reformatted hard drive or reinstalled OS.
  • previous deletion, damaged or missing files.

Continue reading “Review: Data Rescue 4”

The Twelve Days of Krav Maga

On the twelfth day of Christmas, my true love gave to me:
Twelve practice knives
Eleven decks of cards
Ten rounds of Bas
Nine focus mitts
Eight yellow guns
Seven tombstone pads
Six kick shields
Five decks of cards
Four boxing gloves
Three gum shields
Two shin guards
A brace for my bad right?knee.

Farewell, Mu

Last night, Mu – my faithful feline companion of 18 years – passed away. It was quick and she did not appear to be in pain.
IMG_7183.JPG

A Horribly Wrong Attempt at Doing it Right

For several years, I have made it a practice to have separate email addresses (aliases) for separate purposes. This has made it easy for me to dispose of addresses when I no longer needed them – usually when I no longer wanted to receive emails from parties to whom I’d given the addresses. This also makes it easy to detect, and shut off mail from, companies that add you to their spam lists. Examples include online stores that I’d buy from ([email protected]), annoying realtors ([email protected]), and addresses I’d use in a variety of online forums ([email protected]). If you own your own domain name, or have a good email provider, this process is generally fairly simple.

Recently, I noticed I wasn?t getting any emails from Meetup.com. I?d just unsubscribed from a bunch of groups and changed others to not email me anymore, and since I hadn’t hosted any events in my group for some time, I didn’t think anything of it. As I’ve spent most of the last couple of months traveling, I did not miss the deluge of notifications of activities I wouldn’t be able to participate in anyway.
Separately from this, I had stopped receiving emails from American Express. I did not really notice this until I attempted to reset a password and never received the confirmation email that was to allow me to make the change. I sent myself a test email, and got it immediately, so I figured it was an issue on their end. As an alternative, I had Amex text me the confirmation code I needed, and promptly forgot about the email problem.
I also stopped receiving emails from Amazon.com, telling me my order had been received. But since I was getting text alerts of the package shipping and delivery status, I felt like I was still in touch with Amazon, so I didn’t think anything of it.
Finally, my financial advisor needed me to sign some electronic documents, and they kept emailing me, telling to sign them. I kept waiting for the forms, coming via Adobe’s document signing service, and they never arrived. Then I started to do some simple math and realize that we had a problem.
So I began to pay attention to this problem and troubleshoot it. My personal email was hosted at a budget hosting provider, and then forwarded to a Gmail account. I would send test emails to myself, and they would show up. I checked my junk mail folders, and searched everywhere, but could not find any recent emails from Amazon, Amex, Meetup, and other vendors, yet my tests came through! Why? Now that I was aware of the problem, I had to know, so after I’d exhausted all the troubleshooting I could do myself, I opened a chat session with my hosting provider. The results were astounding.
But first, a little background information. DNS – Domain Name System – is the service that translates somewhat human-friendly Internet site names, e.g., nikolaidis.com, amazon.com, and example.com, into computer-friendly numbers, e.g., 74.207.233.119, 72.21.194.212, and 93.184.216.119. There are several types of DNS records, and one of them is SPF, short for Sender Policy Framework. This began as a proposal several years ago to allow for some sort of authentication of email.
Most people probably do not realize that, in most cases, it is quite trivial for anyone to send email as just about any address they want, and unless the mail servers’ administrators take deliberate action, there’s nothing stopping this. This means that I can quite easily send an email to you as [email protected], telling you to click the link below to reset your password, and if you are gullible enough to do so, steer you to a phishing site where I steal your credentials. SPF is an attempt to combat email forgery, but allowing owners of domains to set up authorized lists of email servers that they can send email from. If the owner of the domain configures this, and the receiving mail server actually checks it, this can be an effective way to authenticate the sending server and allow or reject the email, based on its validity.
Back to my budget host. A couple of months ago, supposedly to comply with an ICANN regulation (which I do not buy for a second), my host made a change that enforces checking of SPF records. To prevent spoofing of emails, they will not forward any email for a domain that has an SPF record unless they are authorized to do so. This means that if I am not Amazon.com, my host will not forward emails claiming to be from Amazon.com. So far, so good.
Some mail systems have the concept of an alias, which is one way of saying “anything addressed to [email protected] goes to [email protected].” Another way to accomplish this is to set up an email forwarder, which is another way of saying “any emails that come here for [email protected] we will forward on to [email protected].” If the difference seems trivial, it can be. Essentially, forwarders are usually used to send email to a different mailbox or server, whereas aliases are both local to the same account on the same server. So if [email protected] and [email protected] are on the same server, you’d normally use an alias, but if Robert wanted his email to forward off to a Gmail account, he’d use a forwarder.
Here’s where things get stupid.
My budget host supports email aliases by using forwarding addresses only, not aliases. I would normally make up a forwarder for each purpose, and have that forwarded to my Gmail account. My host’s recent attempt to comply with a supposed ICANN directive means they will no longer “forward” an email unless the SPF records match. Since Amazon does not have an SPF record, saying that my email host is authorized to send email for them – why would they? – my host will not forward my email, which has landed in my mailbox, to my own external mailbox. “Okay,” I said, “I’ll set up a new, local account on my host, and have my forwarders forward to it, and then check that mailbox separately.” Nope, that won’t work either, as this is still considered a “forward” and my host won’t do that.
What?!?! When I heard that, I was astounded. Essentially, this host, which is a large, tier 1 hosting provider, has just killed the idea of aliases altogether. Their suggestions were for me to have Amazon set up an SPF record for my host mail server (Uh… no, you level 1 idiot, Amazon is not going to grant me the honor of sending email as Amazon to every one of their customers who wants to receive email from them), and for me to simply set up a new mailbox for each address I want. I have over 100 email aliases. So they want me to set up and check over 100 mailboxes now? I think not!
This is a case of good intentions gone horribly awry. I can only hope my host realizes the level of idiocy they’ve fallen to in their attempt to make things better. In the meantime, I’m moving my email to the one that we use and resell at work, which does not have this well-intentioned, yet stupid, restriction. As a result of my not receiving emails from Meetup.com for several weeks, I never got the email telling me that my dues were due again, and as a result, I lost control of my favorite Meetup group, which I’ve run for the past year. Fortunately, one of my fellow members pointed this problem out promptly and I was able to renew my subscription and reclaim my group. This is a relatively minor consequence, but it does not take a long stretch of the imagination to see more serious consequences coming from emails being unanswered for several months.
On the plus side, I realized that I was still receiving emails from Plenty of Fish, so I was able to use this as an opportunity to delete that forwarder. Advice to those of you who use online dating: avoid PoF. Trust me, eHarmony and OKCupid are better.