Twitter’s proposed limits could be the death of Twitter

You ever watch a snowball fall down a hill?

As it collects more snow, it gets bigger it collects more snow and moves faster, and as it moves faster, it collects more snow and gets even bigger.

This is the twitter (and frankly every successful explosive growth resource in the past 2000 years) growth and scale-out model.

Now, imagine for a moment that a snowball had a limited amount of snow it was allowed to collect at a limited speed.   It would continue to grow at a linear rate, linear speed and quite frankly might even stop or MELT at the pace it was moving.   That’s not scale-out, that’s called a collapse and melt methodology.

This not only stifles innovation and integration, but it out right cripples an entire community working at growing at hockey-stick sized projections.   The kind of partner ecosystem which promotes growth and self-innovation is what has brought us ultra-successful business models (take Microsoft for example, heard of them?)

However, what it appears they’re taking in this ultra-conservative approach, with little action on raising the bar will go the route of eBay tactics where the community finds itself hands bound and tied, unable to help grow and scale the business, eventually leaving for other opportunities because this ship has sailed, and sadly sunk.

Check out the Social Too entry on this and perhaps Twitter might do something to stop itself from chopping its own head off.

NetApp and Virtualization One Stop Shop!

You ever ask the question “Wow, I wish there were a consolidated place to find everything* there is to find about NetApp and Virtualization?

I ask that question all the time.  The following is a release of my internal notes I’d forward to people when they say “NetApp + Citrix?” “NetApp + VMware” or “NetApp + Hyper-V”

This way, both you AND I have a single place to go look and I don’t have to reinvent my wheel!

Everything you wanted to know about NetApp and Virtualization but were afraid to ask.

 NetApp Virtualization Team Blog – Great resource of information and the definitive source on updates of new documents, TR’s, etc – It is where I’ll update new links like those above from. NetApp Virtualization Team Blog – Great resource of information and the definitive source on updates of new documents, TR’s, etc – It is where I’ll update new links like those above from.

VMware and NetApp

Microsoft and NetApp

Citrix and NetApp

Oracle and NetApp

And some definite –must- reads!

NetApp Storage Efficiency Calculator

NetApp 50% Virtualization Guarantee* (Effective until December 31, 2009)

Top Must Read Knowledge Base Articles (Virt-KB!)

NetApp Virtualization and Twitter!

Yes! I was able to track down the folks at NetApp who are on Twitter, so follow them here!

NetApp Virtualization and YouTube!

  • NetAppTV (Customer Success Stories and other cool videos)
  • NetAppTube (Demos from VMWorld and more!)
  • NTriantos (SMVI, VDI, OSSV and more!) 

NetApp Tools for Virtualization!

And last but not least!

 Vaughn Stewart – Virtual Storage Evangelist and all around great VM Guy! Vaughn Stewart – Virtual Storage Evangelist and all around great VM Guy!

So, hopefully these resources will be useful to you, I know they’re pretty useful for me and I reference them often.   Definitely read the Must Reads, regardless of Virt Solution!

New version of Twitter Phishing Scam with access-logins

Excellent! One of my self-infected accounts I created to track this Phishing scam has hit paydirt!

Here is what the tweet will look like:

Hey, i found a website with your pic on it... LOL check it out here

It brings you to the same type of site, again no malware or spyware executing by visiting there.

By now the site should be in your anti-phishing dialog (Chrome and Firefox caught it, I had to bypsas that to get to the site)

You do have to watch out because the method of distribution of this attack appears to be very SLOW to hit, I’ll see tweets come 2-3 or 15-20 minutes a part from the same account, so be wary of the tweets we’re in for a long night of this infection continuing to spread!

If you have been infected – Change your password, and make sure you haven’t stopped following people.   That’s all I can say for now.  Reference these links for more details on this Phishing Scam on Twitter

Twitter Phishing Scam with Blogspot – Post Mortem

Phishing Scams finally hit Twitter!

Gone Phishing

Who is Craig Martin (A funny blog post about You!)

Alright, in honor of the great successes brought about by Jason Mitchener’s question before, a few more funny blog posts! (It may not be funny, it may simply be ironic what this Worm has done ;))

So on to our question of – Who is Craig Martin?

Full-time traveller; lover of coffee and wine; editor of websites 

Which is a pretty good question, he appears to be a traveler and a Kiwi – I love Kiwi’s, especially with Strawberry!  

Well, for one thing by the look of his website he’s a pretty busy guy out wining and dining err wining.

He’s an editor of websites, so I’d suggest checking out his (various) sites, because from his main site alone, wow! Looks good to me! Very structured especially inlight of others trying to do similar and only inducing chaos.   I also think it’s cute how he says “zed” in his little video, not to mention that he has a whole introduction and video going on – while sitting in a beautiful garden!

He’s a traveler, adventurer, Ninja.  Okay, maybe he’s not a traveler, but he is a hardcore ninja, the likes of which you could only counteract with Pirates.

So, be sure to follow @craig_martin and check him out, he’s great and apparently with his following of 666 followers he’s in lieu with the devil so help break him from that habit! ;)

Oh, and he’s very friendly so check him out! :)

Twitter Phishing Scam with Blogspot – Post Mortem

What are our lessons learned so far from this little Twitter Phishing Scam?

First of all, this involved infecting a single or single groups of people.

Distribution consisted of Infect a person by sending them to a site to capture their credentials.   Once those usernames and passwords were collected, they would then use those compromised credentials to send this same message (via DM) to their followers, and continue the spread.

If Joe has 10 followers and DM’s it to those 10, and those 10 have 10 followers and DM it to the next 10, shortly you’d have thousands who are redistributing this – So long as they’ve visited the site and entered their credentials to be captured.

I see a lot of anger “I’m going to get person ‘x’ who sent me this message!”

It’s not the fault of the sender, not entirely.   They were compromised by a phishing scam, it happens, you should work towards educating them instead of castrating them.  So next time it will be part of their sense to not transmit their username/password to an untrusted site.

How could this terrible thing have happened? Now I hate (BlogSpot, Twitter, Followers)

Don’t hate the player, just be glad that it WAS done this way (a semi-safe site with only a small portion of cookies which get added to your browser)   Here is what could have happened if it were introduced in an effective ‘distribution manner’.

You visit the site, you are prompted for credentials.  Perhaps you’re prompted for credentials, though the better payload would be in the form of Malware, Spyware, Phishing-ware, Password capturers, and a number of other infection mechanisms.

Once this would be done, you’d be able to compromised on a number of fronts and able to distribute this to millions instead of just the few followers you have – Infecting Facebook, your banking account, etc so on and so forth.

What can I do about this in the future?

The universal rule of communication, especially unsolicited is ask yourself a few questions.   Would you visit this link if you were having a conversation with the person? Having established rapport with them while talking? Yes likely.

However the tip here is – Random “auto-dm’s” does not guarantee a reason to visit their link.  Yes a lot of people DO send out auto-DM’s, to the bane of all of us (SocialToo/ChrisBrogan– Thanks for helping limit that exposure!)  However, don’t bane all communication in the future.   If you think someone seriously DID write a funny blogpost about you because the person knows you, definitely do check it out! But in all seriousness, if you’ve not had some kind of established communication with this person to justify it, and let alone it brings you to not a funny blogpost, but to a fake twitter login page – Be sure to question it and use your common sense here.

Oh, and be wary of ever entering your credentials – again unless you explicitly trust the source.

Hopefully this Post-Mortem helps you deal with this situation, I’m still waiting for my self-infected account to start tweeting out to me (Controlled infection) For every problem there will be people looking to exploit it, and others trying to solve and contain it.   I’ll be there trying to find new solutions and rid the world of future exposure as well :)

Good luck, and feel free to follow me if you like :) @cxi