770 lines
66 KiB
Plaintext
770 lines
66 KiB
Plaintext
|
|
Episode: 777
|
||
|
|
Title: HPR0777: What is Cloud?
|
||
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0777/hpr0777.mp3
|
||
|
|
Transcribed: 2025-10-08 02:21:07
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
You
|
||
|
|
Hello everybody and thank you for joining us for another episode of Hacker Public Radio.
|
||
|
|
I am Stank Dog and I am joined this week by Josh Nath and Bullets, two experts in the
|
||
|
|
field of cloud computing.
|
||
|
|
A little bit over so you guys too much calling your experts but definitely know a lot more
|
||
|
|
than me so I am glad to have you on the show to ask you a bunch of questions.
|
||
|
|
You guys ready to be grilled?
|
||
|
|
So, cloud computing is certainly a huge buzzword these days.
|
||
|
|
You see it here about it, read about it everywhere but I have found that there is a whole lot
|
||
|
|
of confusion, there is a lot of misconceptions, a lot of false allegations and worries and
|
||
|
|
concerns out there in my opinion in any way.
|
||
|
|
So I have been doing a lot of research on it and actually we will talk about this later
|
||
|
|
on the show but we have actually made a switch to the cloud but before we go there let
|
||
|
|
us kind of back up and let us talk about what is the cloud.
|
||
|
|
I know I always start when I do these shows, whenever I talk about some presentations let
|
||
|
|
us start, you know, let us begin at the beginning.
|
||
|
|
Let us get everybody on the same page.
|
||
|
|
What is the cloud?
|
||
|
|
I have seen the commercials so the rooms this cloud is an Amazon, Apple, Microsoft I think
|
||
|
|
as a cloud, Google I mean they all work together to make this one giant cloud that we all
|
||
|
|
share and that works.
|
||
|
|
No, everybody has a different cloud and realistically the definition of a cloud depending on who
|
||
|
|
you speak to is considerably different.
|
||
|
|
I know some groups will go off and say that if it is virtualized it is a cloud.
|
||
|
|
I even know a guy who says all web hosting is a cloud.
|
||
|
|
It really depends on who you are talking to.
|
||
|
|
A lot of people accuse Microsoft of thrashing the word cloud all over the place including
|
||
|
|
calling remote desktop a cloud service and we are all like wait a second guys that is remote
|
||
|
|
desktop but really depending on who you are talking to you are going to get different
|
||
|
|
answer and in most cases it is a form of something else that somebody already said what we
|
||
|
|
believe cloud is a set of technology not just one technology that allows you to have greater
|
||
|
|
control over resources giving you the ability to split a single server into multiple VMs
|
||
|
|
or containers depending on the hypervisor that you are using and allow thin provisioning
|
||
|
|
for services and data.
|
||
|
|
Well, we are definitely going to come back and talk about hyperbigers and some of those
|
||
|
|
terms you just threw out but let us back up a little bit and say share resources is not
|
||
|
|
it.
|
||
|
|
That is nothing new.
|
||
|
|
We have been able to throw up a Linux box or a Units box or anything and have multiple
|
||
|
|
accounts.
|
||
|
|
They are all sharing a hard drive.
|
||
|
|
You just give this person a quota, that person a quota, what is different than that versus
|
||
|
|
the cloud which is another form of shared resources.
|
||
|
|
The ability to expand that shared resource so if you are on a shared server on a Linux
|
||
|
|
server and you have 500 gigs of storage space you are only allowed that 500 gigs until
|
||
|
|
you have to add another hard drive.
|
||
|
|
In a basis of a cloud you can add additional storage by attaching more virtual storage.
|
||
|
|
You are not having to wait for the increase of physical storage on that system.
|
||
|
|
You are able to add it on without having to bring down the system.
|
||
|
|
Also security is a big shift in the cloud.
|
||
|
|
One account on your Linux box would be compromised to the point where a root level exploit could
|
||
|
|
be executed.
|
||
|
|
Your entire server and everybody on that server would be compromised.
|
||
|
|
In a cloud platform you can isolate users to the point where if one account, one user,
|
||
|
|
one virtual machine, one container gets exploited you would only have to deal with that virtual
|
||
|
|
machine because all the other ones are completely isolated from one another.
|
||
|
|
It is not just storage or hard drive space.
|
||
|
|
It could be any hardware resource, more memory, more storage arrays.
|
||
|
|
Like you said, it could be any of those things can be expanded without taking the system
|
||
|
|
down.
|
||
|
|
Basically, it has that ability to be updated dynamically, correct?
|
||
|
|
Correct.
|
||
|
|
CPU, memory, storage, you can even go off and restrict the number or amount of CPU that an
|
||
|
|
account can use.
|
||
|
|
Say you got somebody that you know, if given the ability, they would go off and run your
|
||
|
|
clock cycles right through the roof.
|
||
|
|
You can go off and say you know what, we're only going to give them half the cores on this
|
||
|
|
physical system and we're going to throttle them so that if somebody else is running another
|
||
|
|
batch project, this takes a back seat.
|
||
|
|
You have a lot more control over what a single user or single account can take on a system
|
||
|
|
without having to worry about it completely crashing the entire node.
|
||
|
|
Which sounds like that would be a huge benefit when one particular site domain VM, whatever
|
||
|
|
you want to say, is being attacked by DDoS or anything else.
|
||
|
|
You can limit and contain the damage done and won't take down the rest of the cloud.
|
||
|
|
Right.
|
||
|
|
And one of the other bit I did on this, I used cloud-based virtual machines to mitigate
|
||
|
|
a DOS attack.
|
||
|
|
So we're not talking about these things being weak.
|
||
|
|
They're pretty beefy so for people who are like, well, I don't want to get something
|
||
|
|
that's going to break or not be able to handle what I do.
|
||
|
|
Just to give you kind of a standpoint on that, I got five virtual machines from different
|
||
|
|
providers all around the world and used them to filter a DOS attack.
|
||
|
|
That was seven gigs per second, I think.
|
||
|
|
Yeah, it was a beastly attack, but using a mixture of Round Rob and DNS and some programs
|
||
|
|
that I've written, I was able to filter that traffic and only clean traffic would pass
|
||
|
|
through those virtual machines.
|
||
|
|
So customers on the other side were up and running and those virtual machines handled
|
||
|
|
like a dream.
|
||
|
|
Now, did you talk about this in another episode of HDR?
|
||
|
|
I did.
|
||
|
|
It's actually the first one I did was the DOS, what it is and how to protect yourself from
|
||
|
|
it.
|
||
|
|
So if you are listening to this one for the first time and want to hear a little bit
|
||
|
|
more detail about that, you can go back and find that in the archives, hackerbolebradio.org.
|
||
|
|
Always, you need to go back and look these things up because we cover so many topics on
|
||
|
|
the show that it's just, I love going back and listening to stuff or re-listening to
|
||
|
|
stuff over and over again.
|
||
|
|
So that's great that we have the ability to do that, especially now that we have a
|
||
|
|
lot more storage thanks to the cloud, but we'll come back to that later too.
|
||
|
|
Now, I got to tell you, I can't help but think back, you know, I'm kind of an old dog
|
||
|
|
these days and I do remember many years ago that initial, I guess, talks, ideas of this
|
||
|
|
starting to come up.
|
||
|
|
I know one of the first attempts that, I don't know if you'd call it cloud, but there
|
||
|
|
was something they tried to start, they tried to create a trend called network computers,
|
||
|
|
which was just a thin client, is what they would call it, it was just having a computer
|
||
|
|
on the front end that just had the basic hardware, it didn't even have storage or very
|
||
|
|
minimal storage in it, and it kind of, I guess, outsourced, for lack of a word, all the
|
||
|
|
operating system, all the applications, all the, all the work that needed to be done
|
||
|
|
over to a server to do all the work.
|
||
|
|
This kind of reminds me, or it looks like it might have been the beginnings of, not maybe
|
||
|
|
not exactly cloud computing, but the software as a service aspect of cloud computing.
|
||
|
|
The name cloud, and maybe correct me if I'm wrong, but I'm pretty sure that goes back
|
||
|
|
to the old days when you would do a network diagram, when you're in a company or a university
|
||
|
|
of a big network with lots of switches and all that, you do a nice big network diagram,
|
||
|
|
they would always show the individual components, but then they would eventually show it, leading
|
||
|
|
off into a cloud icon, just a little way to illustrate that this connects out to some
|
||
|
|
ethereal network somewhere, or the interwebs itself, and that's where the cloud came in,
|
||
|
|
is trying to say, you know what, once it gets out there, the details aren't so important
|
||
|
|
anymore to know exactly how many servers, how much memory, because it's all dynamic.
|
||
|
|
Is that where the term cloud comes from, or?
|
||
|
|
The term cloud from back then, I guess, could really relate to the term cloud now, because
|
||
|
|
back then it was just used when people didn't want to get into all the nuts and bolts that
|
||
|
|
built that network.
|
||
|
|
Now it's to try and explain cloud to, from any one perspective to somebody who isn't
|
||
|
|
intimately knowledgeable on the subject, it becomes a very difficult task, because just
|
||
|
|
in a little bit that I did earlier, I went over hypervisors, virtual machines, containers,
|
||
|
|
dynamic storage, thin provisioning, all that kind of stuff makes what cloud is now today.
|
||
|
|
What you're talking about with the thin clay and the, or dummy terminal and the mainframe
|
||
|
|
is probably the earliest rendition of what is now becoming to be more common VDI, virtual
|
||
|
|
desktop, which is actually something we're working on here to be able to present as a service
|
||
|
|
for customers as well.
|
||
|
|
That would probably be another episode entirely, just because of how wide of a range of
|
||
|
|
topics that can reach.
|
||
|
|
But it does focus on a lot of things that cloud uses, that scalable storage, the ability
|
||
|
|
to thin provision, users' accounts, and make sure that they're isolated.
|
||
|
|
Things like that become extremely important, especially now when you start talking about
|
||
|
|
the security of the end user's data, and who owns that data, and what happens if one
|
||
|
|
user's data is compromised or is accessible by another user.
|
||
|
|
I personally wouldn't want any of our buddies to go off and see all my personal financial
|
||
|
|
data.
|
||
|
|
They may be my friends, but they don't need to see my bank records.
|
||
|
|
Sorry about that.
|
||
|
|
Didn't mean to hack into that box, I didn't know that was your financial information, I'm
|
||
|
|
kidding.
|
||
|
|
I'm trying to be careful, it could be dangerous, it could make a five-hour episode if we
|
||
|
|
go down this road, but there are multiple types of cloud computing.
|
||
|
|
There's a lot of different things that are referred to as cloud computing, and I kind
|
||
|
|
of mentioned one you touched on another, I mean we're kind of focusing on what's called
|
||
|
|
more of a general, I'm trying to stay with general cloud computing ideas, but private cloud.
|
||
|
|
But there are other things, like you said, the remote desktop, which can be argued that
|
||
|
|
that that's a type of cloud, I mean that's the Microsoft.
|
||
|
|
I know Oracle, Ellison from Oracle, he's been outspoken saying that they've been doing
|
||
|
|
cloud for years, they just never called it cloud, it's the same thing, and it's just a buzz
|
||
|
|
word.
|
||
|
|
I mean, it's kind of a controversial phrase to just say that a lot of places are starting
|
||
|
|
to say their cloud technologies when they're really just client server, but done in such
|
||
|
|
a way that pretend or make it invisible, I guess this goes back to the cloud idea on
|
||
|
|
the old network diagrams and just to think, you hide everything behind a cloud, you put
|
||
|
|
an icon, you say to the user or the person reading it, don't worry about what's going
|
||
|
|
on behind the curtain, ignore the man behind the curtain, is there anything inherently
|
||
|
|
wrong with that, Microsoft commercials and Apple say, it's got a little kid, it's in
|
||
|
|
the cloud, a child can use it, on one hand I can certainly see that makes things easy
|
||
|
|
for a user, there's really nothing wrong, I guess, with having someone else do that
|
||
|
|
work for you, especially someone that's knowledgeable, it does allow a lot of people to do that
|
||
|
|
without knowing so much about what they do, I mean, I don't think people who listen to
|
||
|
|
this show are more appreciative and want to know the nuts and bolts of it, but a lot
|
||
|
|
of people don't, so I don't see anything wrong with that, do you?
|
||
|
|
I don't see a problem with it in the sense that, you know, saying, okay, it's in the cloud,
|
||
|
|
don't worry about it, but there are people who are paid to worry about it, the people who
|
||
|
|
are the CTOs, the people who have to make sure that their data is safe and secure, the
|
||
|
|
people who are required to maintain PCI and SAS 70 and every other industry is standard
|
||
|
|
out there, you need to make sure that your data is safe and it just becomes one of those
|
||
|
|
things where you kind of have to take a deeper dive into what each individual is talking
|
||
|
|
about when you start talking to companies and different things like that, what they see
|
||
|
|
as cloud, because like I said, I talked to a guy last November and he's like, well, isn't
|
||
|
|
all web hosting cloud and you hear that thought from a lot of people who aren't really knowledgeable
|
||
|
|
in server side or what web hosting is or what service hosting or anything like that.
|
||
|
|
So it really becomes one of those things where you have to understand who you're talking
|
||
|
|
to and generate a uniform discussion as to what you guys believe cloud is. I've had
|
||
|
|
to sit down with our sales department and say, okay, this is what we call cloud because
|
||
|
|
you don't want to go off and compare apples and oranges. It becomes very ugly, very quickly.
|
||
|
|
Well, you know, and you kind of said something that I want to re-emphasize or clear up what
|
||
|
|
I was, that you said a little bit better what I was trying to allude to is, you know, as,
|
||
|
|
again, this is hacker public radio, I'm speaking from a hacker standpoint, I don't really trust
|
||
|
|
anybody, you know, very few people and those that I do, you only trust them to a certain extent
|
||
|
|
and that's a very, very important thing that you said. It's okay to not know, it's okay to not
|
||
|
|
care to a certain extent, especially just the home user. If you trust Apple and their new iCloud
|
||
|
|
that they just announced recently, which was mobile me before that and whatever, if you do trust them
|
||
|
|
and I'm not saying you shouldn't, then great, you probably don't want or need or care to know the
|
||
|
|
details of how they do it behind the scenes. If you trust that they're doing it right,
|
||
|
|
if you trust that they're doing it securely, if you trust that they have your privacy in mind,
|
||
|
|
if you do trust, in this case Apple for those things, great, there's nothing wrong with that,
|
||
|
|
no problem with that. But when you get to other types of cloud technologies or other companies,
|
||
|
|
you have to handle it on a case-by-case basis. So there's certainly a lot of things that I do
|
||
|
|
not know, but I absolutely trust you and what you guys have been doing with Ben Redd and what
|
||
|
|
you've been doing with Hacker Public Radio. So yes, I'm very knowledgeable about it, but I've
|
||
|
|
certainly no expert on it. So you and I had a long conversations for months of me grilling you
|
||
|
|
and asking all kinds of questions and information to make sure I was comfortable where we're going,
|
||
|
|
make sure it worked for us, make sure I was comfortable, and the levels of security and not only
|
||
|
|
was I comfortable, I was pleasantly surprised. So by being on every single case, you as a user have
|
||
|
|
to make the decision of whether you trust the people running your cloud. Exactly. And this kind of
|
||
|
|
is a good segue into a couple of political topics, I guess, that you'd say. I've heard,
|
||
|
|
I'm going to bring these up even though I've got to tell you this first one to me. It's just
|
||
|
|
silly, but I've heard it said before, somebody said this to my face that cloud computing was evil.
|
||
|
|
Just a generic statement like that, that it's this horrible evil technology that's destroying jobs
|
||
|
|
and destroying data centers, destroying IT professionals. And they were serious about it,
|
||
|
|
and I'm not sure that I've even, I'm trying to be devil's advocate and see both sides and kind of,
|
||
|
|
well, I'm not sure I see that. Have you ever heard that before?
|
||
|
|
I've heard it, but people need to understand this. I think you said it best. Technology is neither
|
||
|
|
inherently good or evil. It just is. It exists. What you use it for ultimately is going to determine
|
||
|
|
its purpose. Realistically, IT professionals need to stop fearing it and start looking as a tool,
|
||
|
|
because cloud is great. It's awesome, but it's not going to replace every single option out there.
|
||
|
|
There are definitely some use cases where you need to have a completely physical server,
|
||
|
|
completely physically contained in a location that you don't want all the other equipment that
|
||
|
|
goes into making the cloud or the other network access that requires for the cloud to work. So,
|
||
|
|
keep in mind, cloud is not the end-all-do-all solution, but it does help make your job easier. It
|
||
|
|
helps cut costs on a lot of things, instead of having a bunch of legacy hardware sitting around
|
||
|
|
on the shelf, you can get a newer system, virtualize that legacy hardware, put it into a storage system
|
||
|
|
that is maintained a little bit better, and now you've got a virtualized environment of the old
|
||
|
|
system, sitting on whatever high-survisor you choose. The storage has now been updated to a point
|
||
|
|
where you don't have to worry about disk failure, and if you need to expand your resources on that
|
||
|
|
system, you don't have to worry about, oh crap, I don't have memory for this system anymore because
|
||
|
|
it's 20 years old. That's a good point. If anything, it probably extends the longevity of this
|
||
|
|
equipment, because when it dies out, you can't replace it anymore. Okay, time to upgrade to a new
|
||
|
|
one. It's invisible to the user. You've built your own hardware as long as you could, and taken
|
||
|
|
advantage of it. So, you've actually extended the longevity of what you had before, as opposed to
|
||
|
|
after it's 10, 12 years old, and your client or whoever was using that hardware, wherever you're
|
||
|
|
releasing a tool, whatever leaves your stuck trying to sell that and re-get someone else
|
||
|
|
to buy or use or at least service and get paid for services from a 12-year-old system, which is
|
||
|
|
all they are to do. Everybody wants the latest and greatest. But the cloud you can kind of combine
|
||
|
|
all those together, obviously, that's your mileage may vary on those type of things.
|
||
|
|
So, but I mean, yeah, I think you refer to something we talked about before we started the show,
|
||
|
|
and that is hackers have traditionally always believed that technology is inherently neutral.
|
||
|
|
It is inherently neither good nor evil. So, anybody who would say something like
|
||
|
|
a technology is evil and is horrible, no, it has to be applied just like everything else. And you
|
||
|
|
mentioned by applying this, there's a whole lot of positivity, a whole lot of good ways it could
|
||
|
|
be used. And I think we've seen in the news recently, some bad ways it could be used that,
|
||
|
|
you know, people have been using cloud and leasing out bandwidth and stuff like that for
|
||
|
|
DOS attacks and other things that have been in the news. So, it's about how it's used in
|
||
|
|
technology in another cell. This ridiculous, look at peer to peer. You know, that's been called
|
||
|
|
evil, but my god, it's got so many wonderful, fantastic uses that you can't just label any technology
|
||
|
|
that way. So, one of the other things that I've seen brought up, and I'm not sure how I feel,
|
||
|
|
I'm actually curious what you've say to this. Right now, if any, let's say a site, because I
|
||
|
|
can't think of a better way to illustrate this, a site or a company has all their information
|
||
|
|
in a cloud. Let's say they have all their stuff on one private cloud or one cloud they're getting
|
||
|
|
from anywhere in the world. Let's say Wikipedia, for example. And I don't know how they're
|
||
|
|
set up, I'm not claiming anything for them, I'm just making up an example. What if a site,
|
||
|
|
and let's say Wikipedia, because everybody at Leasing knows that, decided that, you know what,
|
||
|
|
we're going to shut down and lock down our cloud. I mean, they have the potential
|
||
|
|
to say, you know what, we have decided that we're only going to make Wikipedia available to
|
||
|
|
the United States and Canada or something like that, and just start locking other countries.
|
||
|
|
I mean, do we have a danger set up because of the cloud that everything is easier contained,
|
||
|
|
and therefore easier to jail up from the rest of the world or jail up from other countries or
|
||
|
|
companies? Is that a valid danger and is it a realistic thing? I think that's a two-part question.
|
||
|
|
Is it valid and is it, because I think technically it's possible, right?
|
||
|
|
Right, it definitely is possible, but it's no different than if it were a physical server.
|
||
|
|
Volt and I were just kind of mumbling to ourselves here. It's no different than if you had a physical
|
||
|
|
box and you said, you know what, I don't want trying to visit my sites anymore. They've been
|
||
|
|
trying to hack me and deduce me, just like you would on a physical system, you can go off and say,
|
||
|
|
I don't want this range of IP addresses accessing or getting a ASA firewall or whatever brand
|
||
|
|
firewall you want to get, you can set up firewall rules. There is no difference in the outward
|
||
|
|
security. You can do it the exact same way. With a physical server as you can with a virtual server,
|
||
|
|
the only thing is with a virtual server, now you are a cloud server, you know, enter into the
|
||
|
|
realm of where you can have virtual firewalls, virtual enforcers that do that as well and then leave
|
||
|
|
other portions of it open. So say you have something that you can access here in the United States
|
||
|
|
and it's perfectly legal, but say you've got information about encryption methods and things
|
||
|
|
like that, that it's illegal for people in a certain country to view and you've gotten notice
|
||
|
|
from that country is saying that they've caught people trying to view this information on your website
|
||
|
|
and they either want you to restrict their internet connectivity to that website or take it down.
|
||
|
|
Now personally, I don't want to get into a fight with another country. I don't have the means
|
||
|
|
to go off and get into a legal battle with another country. So my solution would be simple enough
|
||
|
|
through that portion of the site up on a virtual machine and put that enforcer only onto that
|
||
|
|
virtual machine instead of doing it for the entire box.
|
||
|
|
Well, and I think that's to simplify what we're saying here is the cloud itself doesn't have
|
||
|
|
anything to do with this topic. I mean, it makes it easier for me to administrative standpoint to say,
|
||
|
|
you know what, I'm blocking off the whole cloud and everything in it instead of if you had I don't
|
||
|
|
know five, ten server scattered across the country sharing and serving it up in a traditional way,
|
||
|
|
you could still block them off and just be a little bit harder to do. The cloud makes it easier to
|
||
|
|
administer that, but it doesn't change the fact that it's possible and exists and can happen just
|
||
|
|
as easily without the cloud as it would with. Correct. So it's really a non-issue as far as the
|
||
|
|
clouds. That's just a, you know, a different bigger political issue that someone can do an episode
|
||
|
|
on separately because that could go on. You could talk about that ad nauseam. Yeah, great firewall
|
||
|
|
channel. That itself. It's exactly what I'm thinking in my head. I didn't want to say it, but
|
||
|
|
yeah, that's, you know, the firewall, they're choosing what to block out, but if everything was
|
||
|
|
clouded, they could block an entire cloud or you could withhold your entire cloud. I mean,
|
||
|
|
there's a lot of options there, but I can't wait as now. Let them censor what they wanted censor.
|
||
|
|
Not that I agree with it. I don't want to agree. I don't want to say that at all. I don't believe in
|
||
|
|
censorship, but if that's what that country does, then that's something that people need to work
|
||
|
|
out. But I don't think that's our fight to get in front of the neither. Right. But again,
|
||
|
|
let's go on. That's going off into a political discussion. So we'll rein back in on from that.
|
||
|
|
Well, the other thing I think is kind of related to that is, you know, and I'm going to,
|
||
|
|
let's segue a little bit into a little bit deeper here. We've kind of talked about these,
|
||
|
|
but let's go into them analytically. Let's talk about some security issues and privacy issues
|
||
|
|
that are brought up all the time when it comes to cloud computing. Let's address these directly
|
||
|
|
and see what we can come up with on some of these. Is privacy a real threat, an enhanced threat,
|
||
|
|
and cloud computing versus traditional? A lot of things we've talked about. We said it's no
|
||
|
|
different. Cloud makes it easier to administer and set up and all that kind of stuff, but it's
|
||
|
|
really the same overall concept. Well, have we opened up new privacy issues with the cloud, for example?
|
||
|
|
And we might have to back up and define software as a service before we go down this road. But
|
||
|
|
other people inside of our cloud or other people that are sharing cloud together,
|
||
|
|
is there an extra danger that because they're inside of the same cloud that they can have access
|
||
|
|
to my data and vice versa? In most cases, there's no like platform as a service or, or in this case,
|
||
|
|
infrastructure as a service is what Benrev has with us. They're completely isolated. No
|
||
|
|
VM, no user can access the others data because it doesn't even know that that data is there.
|
||
|
|
At that level, it's completely tied down to that user. The other users have no idea that that
|
||
|
|
data is there, that another user is on the scene. It's completely oblivious to it.
|
||
|
|
And that's a private cloud. That's a private cloud or public cloud that's using
|
||
|
|
just about every system out there that I'm aware of. And, lastly, and intentionally,
|
||
|
|
put this hole in there, every hypervisor that I'm aware of out there,
|
||
|
|
restricts and prevents people from going off and seeing other data that's attached to a different
|
||
|
|
VM or a different container because they want to have that security they're built into it.
|
||
|
|
You can, and there are ways of getting around the security mind you.
|
||
|
|
And the stuff you need to review, if you have that question, that is something you need to bring
|
||
|
|
up with your provider. But even in our public cloud environment, we encrypt our customer's data.
|
||
|
|
So I can't go off and just hijack their hard drive. I have to be forcing my way into their
|
||
|
|
virtual environment in our cloud to get access to the data. I can't just go off and say,
|
||
|
|
okay, I'm going to just, oh, they've got something I like. I'm going to just hijack it all.
|
||
|
|
I'd have to get into this system. I'd have to compromise their system.
|
||
|
|
Well, we'll have enough to clarify. When you say, I, in this scenario, you're talking about you
|
||
|
|
as an insider, as a system analyst, as somebody who has access to the system administrator,
|
||
|
|
you, when you say, I, that's the context you're talking about. Even on the inside, you would
|
||
|
|
basically have to do something illegal into, you don't have any extra access.
|
||
|
|
No, I'm using access to forcibly enter a customer's VM unless they provide us with their
|
||
|
|
password, in which case that isn't hacking that's entering with permission. Right.
|
||
|
|
So the danger of, I guess, an insider job is minimized because if you don't have, you don't,
|
||
|
|
necessarily, or require access all the time. Right. These people can administer and do
|
||
|
|
everything themselves without you having access. Right. The only time it ever comes to be an issue
|
||
|
|
is if there is a legal document placed at our, in our hands, saying, hey, we need to find out
|
||
|
|
what's going on here. Right. And at which case, then we are, according to terms of services,
|
||
|
|
the case with just about every host, if you're doing something illegal and they get a report about
|
||
|
|
it, they are illegally obligated to go off and investigate it. What if somebody else in the cloud?
|
||
|
|
Another site is doing something illegal serving up illegal porn of some kind. I'm in the same
|
||
|
|
cloud as my data at risk. No, because you are completely isolated. Your entire entity of your
|
||
|
|
virtual environment is stored in a system that your data is encrypted separate from his.
|
||
|
|
Okay. So if somebody hacked into that site and got complete root level access is my data
|
||
|
|
and my site's in danger? No, because even at root level compromised for that virtual machine,
|
||
|
|
it still is completely oblivious to every other system that's in that cloud.
|
||
|
|
So they could go out and plaster their root name and password all over the place. The data is
|
||
|
|
going to be confined to what they have access to and what they have pre-allocated. Correct.
|
||
|
|
Now, okay, I'm going to how about, and this is the other common thing we hear people bring up.
|
||
|
|
Let's say they gave out the root password. Let's just say they got hacked. Somebody has
|
||
|
|
root access to that box. Are they now inside of the firewall, inside and bypassed a lot of
|
||
|
|
your layers of security and protection? And they're now able to attack from inside of the cloud
|
||
|
|
to other parts of the cloud. Sure, it may be encrypted, but haven't they bypassed some security in
|
||
|
|
that? I mean, it seems like there's some security that's going to be bypassed by that. They're inside,
|
||
|
|
but you're still telling me that there are several layers of security after that that they still
|
||
|
|
have to overcome. Correct. Depending on the hypervisors, security levels are a little bit different.
|
||
|
|
I can tell you, having worked with some of them, there are applications out for like Microsoft
|
||
|
|
Hyper-V that actually monitor traffic between virtual machines. And so if you're using Hyper-V,
|
||
|
|
that tool would actually be able to tell you, hey, wait a second, this guy's traffic's changed.
|
||
|
|
It's now attempting attacks on stink dogs VM. We should investigate this or we should disable it or
|
||
|
|
do whatever to ensure the safety of our system. So that's the human element, but on top of that,
|
||
|
|
there's also the virtual environments involved. And we keep going. When we're talking about security,
|
||
|
|
a lot of it resides in with the hypervisor and with the virtual environments that you're using.
|
||
|
|
Storages have additional functions and things like that, but inherently they're not the most
|
||
|
|
secure point. So you build security around those. Our storages are entirely on a network that
|
||
|
|
cannot be reached from the outside world. You'd have to have physical access or have access to
|
||
|
|
the private network via a VPN and multiple other layers of security. I'm not going to get into
|
||
|
|
just because I don't want to give away too many trade secrets on that. But...
|
||
|
|
But again, that's kind of what I'm saying is somebody did group their way in and got passed
|
||
|
|
the first part, the kind of horror on an internal network. Right, but then there's a separate
|
||
|
|
network from that entirely. So they've gotten in on the public network, public facing network.
|
||
|
|
Okay, you know what crap, now they can do us attack behind the firewall that we have in place.
|
||
|
|
But there's also a limit of how much traffic in our environment that we have set up for you guys.
|
||
|
|
I can see exactly how many kilobytes per second are being used and how much memory everything.
|
||
|
|
I can even see what processes are running, what cores are being utilized, and tell you what's
|
||
|
|
out-of-norm for any VM. Right, and I think this is probably a good point to step back
|
||
|
|
because we've made a reference to this several times. We know the hyperbisers, but for the listeners,
|
||
|
|
I mean, am I over simplifying a hyperbisering to say that it is the host operating system,
|
||
|
|
or it's the system that handles the cloud, handles the technologies, the underlying operating system,
|
||
|
|
not. I'm going to stop trying to say, I'll let you explain it.
|
||
|
|
A hypervisor is the virtualization layer. I mean, that's the easiest way to explain it.
|
||
|
|
It's the virtualization layer. It takes the physical hardware of the node and presents it to
|
||
|
|
the individual virtual machines or containers, depending again, what technology you're using,
|
||
|
|
and acts as that intermediary. Different hyperbisers perform differently and allow
|
||
|
|
for different control, for different utilization, different operating systems. Just various things
|
||
|
|
in there. Your hypervisor should be a selection based on what your needs are.
|
||
|
|
All right, so then, I guess I think better for illustrating this. So, if you were to, let's say,
|
||
|
|
that BinRef continued to grow, and we needed an extra two gigs of memory,
|
||
|
|
you've already got it hardware-wise behind the scenes, and you would have to go into the hypervisor,
|
||
|
|
into that software layer, into that virtualization layer, and say, allocate two more gigs of memory
|
||
|
|
to this client or this account. It does that sort of thing, more hard drive space,
|
||
|
|
or adding scripts, adding monitoring, things like that behind the scenes,
|
||
|
|
or also obviously creating new accounts, creating new virtualizations, new virtual machines,
|
||
|
|
and so on. Exactly. All right, so that kind of makes sense to me,
|
||
|
|
helps me understand it. But, yes, then, based on everything we've just said there and talking
|
||
|
|
about privacy, I don't see... Obviously, there's a lot of other layers of security in there.
|
||
|
|
Are there standards? Are there minimum requirements that people have? I mean, you said that your
|
||
|
|
network's forage is on a whole separate network. Is that common, or is that something that only
|
||
|
|
you guys do because you are very secure and take this seriously? Do all of the top providers do
|
||
|
|
that? Is that a standard? Is it a case-by-case, like you said earlier, do your homework and trust
|
||
|
|
the people you're working with? It really becomes a case-by-case. I've worked with multiple providers
|
||
|
|
when we were building out our cloud initially. I looked at some of our other competitors,
|
||
|
|
looked at some of the other people that were doing it already. I saw things I liked,
|
||
|
|
and I saw things that I didn't like, and the things I didn't like, I intentionally built
|
||
|
|
things differently. Things I like to try to model after. I can say for a fact that there are some
|
||
|
|
out there that your private data goes over public networks, and that's a scary thought to me.
|
||
|
|
I'm not going to name names. I don't want to get my in trouble, but I've come across some
|
||
|
|
providers that do that. Some providers don't even use network-based storage. It's all direct
|
||
|
|
attached, so it becomes an issue of, okay, if that server fails, now you've lost some of your
|
||
|
|
redundancy. You have to do a restore to get that data back. All clouds are not created equal.
|
||
|
|
Correct. I guess I want to be careful here, because we kind of debunked some myths earlier.
|
||
|
|
We talked about this isn't such a huge worry. This isn't such a big deal. This is no different than
|
||
|
|
traditional, but to be clear what it comes down to is cloud computing is not necessarily any more
|
||
|
|
vulnerable, but it is just like any other scenario, a case-by-case basis. You have to trust and
|
||
|
|
know the people you're doing business with, so some fly-by-night people that are offering cloud
|
||
|
|
technology. You cannot assume that your data is private. You can't assume that it's encrypted.
|
||
|
|
You can't assume that if somebody rooted one of the other boxes, they would not easily have access,
|
||
|
|
because it all depends on how they've implemented all of those layers. Levels of security.
|
||
|
|
Exactly.
|
||
|
|
So do your homework. Can cloud computing have a lot of security front? Absolutely. Privacy,
|
||
|
|
absolutely. But I think I could safely say I feel comfortable saying most of the time is secure,
|
||
|
|
but you have to check and make sure the people go in. You know what? If you're looking for hosting,
|
||
|
|
forget about cloud. If you're just going out to find a regular host, you're in the same
|
||
|
|
bow. You need to find if you're going to use some fly-by-night, there's been somebody spamming
|
||
|
|
our forums over at bidireb.com, over at the forums. For some off-site, out of country hosting,
|
||
|
|
and they don't provide a domain name, they don't find a phone number, to contact, then they have
|
||
|
|
no references, no anything. Yeah, I'm not going to do business with you or trust you to take
|
||
|
|
here in my kingdom or any of that kind of stuff. Those same rules apply in cloud computing as I
|
||
|
|
guess what the moral of the story is. I would agree. All right, well, there are a couple other
|
||
|
|
privacy things I want to talk about before I move on, and I think I said we might really want to
|
||
|
|
back up and talk about software as a service or SaaS, which is another buzzword you hear a lot
|
||
|
|
these days because it's kind of related to cloud computing the same way we talked about earlier.
|
||
|
|
It's not so much that you are paying for a system and hosting and memory and stuff like that.
|
||
|
|
It's more that you are allowing the, I'm not sure what the proper term is, the host or the cloud
|
||
|
|
computing company that you're dealing with to run the software on their machines in their private
|
||
|
|
cloud. And I think the biggest example of the biggest success story of this is a company called
|
||
|
|
ServiceNow, which is a help desk type company as a ticketing system. And what they do is they have
|
||
|
|
all of their system running on their servers in their cloud. I don't go to specs with all their stuff.
|
||
|
|
I'm sorry. Sales force is a big one too. Yeah, sales force is another huge one, absolutely
|
||
|
|
good one. We don't know what their clouds are. I don't know if they publish that specs. I just
|
||
|
|
don't know what I'll pay and maybe they post some of that information, but they're not really selling
|
||
|
|
you hosting services or a private cloud for you to host your websites like we've kind of been talking
|
||
|
|
about with us. They are offering you software as a service or SaaS, meaning you pay them monthly fee
|
||
|
|
and you get access to their software that they maintain, they run it, they handle the security,
|
||
|
|
the underlying system administration and I'll take that headache off of you. So you can just use
|
||
|
|
the application remotely. Kind of like Google Apps or I think Microsoft Office works remotely now.
|
||
|
|
You're just using the front end usually through a web browser, not necessarily, but usually through
|
||
|
|
a web browser to use their software and they're handling all the processing and all the work on
|
||
|
|
the backend of it. That is commonly tied to the cloud because like I said, they're running
|
||
|
|
the cloud on the backend and if they can, I think this is where we get to some of the benefits you
|
||
|
|
mentioned earlier about and I think we want to go into some more detail. That is about utilization.
|
||
|
|
We all know that websites spike at different times of the day. We know that sites get slashed
|
||
|
|
dotted and traffic may increase or decrease depending on what's going on. Well, by combining all
|
||
|
|
these together, you won't have as much waste to CPU cycles as much wasted memory because
|
||
|
|
you're all sharing it and you can monitor it more closely and see where it's going and if somebody
|
||
|
|
has some downtime and is not using as much memory or hard drive space or whatever the case may be,
|
||
|
|
someone else can because it's available and you're sharing, you're working together and you can
|
||
|
|
all get better efficiency and utilization from your system. Is that correct? Yeah. It's beneficial
|
||
|
|
for people who are in a cloud environment who have that occasional burst that get slashed dotted
|
||
|
|
what not. It becomes the ability for them to not only scale a single VM but have the ability
|
||
|
|
in a lot of cases to clone and do load balancing and things that are normally something that would
|
||
|
|
take weeks to do or at least a few hours. We have a couple of our customers that I can bring up a
|
||
|
|
new virtual machine if they get really hammered and have it up and running within a few minutes,
|
||
|
|
have a fleet of ten of them up within probably 45 minutes and add that into their load balancer
|
||
|
|
and all of a sudden their sites now running across 20 virtual machines with four cores each,
|
||
|
|
six gigs of RAM I mean and these are virtual machines that weren't there prior to them getting
|
||
|
|
slashed dotted and there's no it's not at the cost to anybody else in that cloud or anybody else
|
||
|
|
you're not the person using those resources and causing harm or slowing someone else down like it
|
||
|
|
is in traditional hosting right exactly so you take out some of the administration time that comes
|
||
|
|
with having to sync up the data get everything configured to get server up and running and then
|
||
|
|
you have the advantage of they're only getting billed for the time that they have those if they
|
||
|
|
don't already have the hardware up and running if they don't have that extra space there they're
|
||
|
|
only paying for the time that they burst over their allotment so now you're not getting this
|
||
|
|
oh I've got this huge amount of bill because I get slashed out twice a month they're only paying
|
||
|
|
for the amount of resources that they use and and in a traditional hosting environment like
|
||
|
|
another thing is even if you're not billed for a band with or something like that like I had a friend
|
||
|
|
who was who did from some shared hosting companies simply because he would have spikes in a
|
||
|
|
database somebody would make a big query to the database or a bunch of small queries and overloaded
|
||
|
|
well you're overloading this equals the mySQL server and that's actually the entire box suffers
|
||
|
|
from that load so you're slowing down all the other customers that are on there so I've had
|
||
|
|
friends that got shut down and kicked off for doing that because land nowadays I think they
|
||
|
|
found ways to throttle back stuff a lot more but if you go over certain amount you're actually
|
||
|
|
causing harm to other people that you're using on the same physical box right so that again
|
||
|
|
is another benefit so and that's where platform as a service has become really popular too
|
||
|
|
platform as a service provides like mySQL PHP rubies are real common one actually for platform as a
|
||
|
|
service Rendooku I think you're one of those guys they're huge sales works actually bought one
|
||
|
|
so they actually do do platform as a service now too not just software as a service but
|
||
|
|
those types of things for people who are having this issue of well I'm using more resources I'm
|
||
|
|
causing these people to go down now they can go off and say okay I want to pay only up to this
|
||
|
|
amount of CPU memory process time queries whatever you want to do it it becomes a little bit easier
|
||
|
|
for people to manage and they don't get this lovely little nose and the mail saying you've
|
||
|
|
used too much resource we've been forced to suspend your account because of this
|
||
|
|
right and it also in this and let's tie it back as I we're talking about software as a service
|
||
|
|
and Salesforce and service now and others similar things not only are they selling software
|
||
|
|
we're explaining why it's in their best interest because it's much more efficient for them to run
|
||
|
|
a local town like that and let them deal with it so that to you as a user you don't care about those
|
||
|
|
sort of things but what it allows them to do is not only to charge you a monthly fee or whatever
|
||
|
|
contract for the software which you know that could be who knows what but also if you need more
|
||
|
|
you can add more that pay as you go that other card system where if you need more bandwidth one
|
||
|
|
month later expecting a lot more sales I don't know what's I don't know who's Salesforce but
|
||
|
|
you're expecting a lot more bandwidth that you're going to be using a lot more disk space that
|
||
|
|
you're going to be uploading a bunch of stuff whatever the case may be they have that flexibility
|
||
|
|
that for you charge you on a case by case the decent support so they can kind of gauge for
|
||
|
|
I don't know if I'd say the platform as a service but sort of they can they can kind of merge
|
||
|
|
the two together charger for software licensing fees and how much disk space or resource
|
||
|
|
you think so kind of an interesting scenario yeah they definitely have a very interesting model
|
||
|
|
it becomes one that you start wondering about the security those on those things and I think
|
||
|
|
you mentioned that earlier with them like who ends up owning the data when they're in a system
|
||
|
|
like that right and that's actually exactly what I was going to say next I mean
|
||
|
|
we talked about the privacy aspects of kind of know if your user inside of a cloud get access to
|
||
|
|
your data well the reason I wanted to pay up software's a service at that point is for this exact
|
||
|
|
reason in the scenario you described it with platform as a service one VM separate from another
|
||
|
|
you guys had your storage section off somewhere completely different sounds like the steps are
|
||
|
|
there to protect that but in a software as a service you're at the mercy of the software
|
||
|
|
not the platform the software itself so how did they implement security obviously we can't
|
||
|
|
speak to this so we're just thinking out loud here but you know I don't think we can speak to
|
||
|
|
whether that's safe or unsafe without knowing a lot more detail did they encrypt the traffic
|
||
|
|
are they sharing the same database are they sharing are it isn't just different tables
|
||
|
|
are you using fine grain access control and sharing the same database for crying out loud I mean
|
||
|
|
there's often a lot of questions there's a lot of questions on that and especially with all
|
||
|
|
the hacks that we've been seeing lately you you'd like to think that company is largest sales force
|
||
|
|
or as large as service now or any of those guys would have these fine grain controls and
|
||
|
|
use separate databases for each user and things like that but you look at the recent hacks like
|
||
|
|
with Sony Sony was an epic fail to me the fact that they had that much data I compromised and they
|
||
|
|
didn't mention anything until you know they kind of got caught with their hand in the jar and another
|
||
|
|
one would be city bank another really bad one in my mind these are companies that are huge
|
||
|
|
like you would think they'd have a full-time security team there and from what I hear Sony actually
|
||
|
|
fired their security team prior to this whole mess happening so it just you got to be really careful
|
||
|
|
who you trust your data with yeah for those who listen to me for years and years I would
|
||
|
|
I would simply say that Sony has been a complete nutter epic fail as a company since the
|
||
|
|
conception of the company but that's also a different topic altogether and I got to say
|
||
|
|
I'm probably crossing a line in the politics here and going somewhere I shouldn't but I think
|
||
|
|
Sony's paid for geo hot that's what you get for fuck with geo hot but anyway I digress
|
||
|
|
privacy and the software service aspect there's too many questions for us to go into that or talk
|
||
|
|
about but I think one question and maybe we can kind of talk about between us just opinion here is
|
||
|
|
are there some things this should not go in the cloud I mean yet a cloud's got a lot of good things
|
||
|
|
going forward it's good technology good efficiency easier to maintain administer all these positive
|
||
|
|
things but it doesn't make it the solution for everything I'm not sure what I would am I comfortable
|
||
|
|
with putting my websites the stuff shared out my cloud sure no problem what I want let's go back
|
||
|
|
to Apple Apple in their iCloud you can put all your contact information your photos are shared
|
||
|
|
up in their music I guess music I wouldn't carry too much about but do I want my family's phone
|
||
|
|
numbers and birth dates and stuff like that in a cloud I mean I'd have to be pretty damn confident
|
||
|
|
and comfortable with it yeah well google was trying to do a medical cloud and that's
|
||
|
|
scared the living daylights on me they're like oh well we'll put your medical data in our servers
|
||
|
|
and I'm just thinking to myself you got to be crazy I'm not letting you guys have a database of
|
||
|
|
all my you know ailments or allergies of things that come up in my mind are you know the movie
|
||
|
|
anti-trust where they've got this massive database about all these programmers and what they're
|
||
|
|
allergic to and different things like that scares me I may be paranoid but it does scare me
|
||
|
|
oh I know it's a that's a little skying at for me too I mean I it's exactly what I was thinking
|
||
|
|
I'm glad you said it because yeah I get I get late book of conspiracy you know I'm very
|
||
|
|
uh google already has a little bit too much of my data I think I try to minimize how much I give
|
||
|
|
them but yeah the idea of the medical data uh did not like that at all I don't want any part of that
|
||
|
|
financial I don't think I'd ever put my bank records I don't even like for example I
|
||
|
|
kind of been and putting a little bit of time lately into um trying to go back and fill in some
|
||
|
|
gaps in my family tree that I've had for years I haven't touched I brought it back up and was
|
||
|
|
trying to fill in some stuff and in doing so in doing some research I see all these people that
|
||
|
|
have shared their family trees out there on the interwebs it's just a general bad idea for privacy
|
||
|
|
to me cloud or otherwise so there are certain things I don't want online therefore not in the cloud
|
||
|
|
so I think I guess each individual person has to make that decision themselves I mean
|
||
|
|
well so you and me on this one are am I alone here no I agree with you I mean I I can't really
|
||
|
|
disagree with you in a sense saying you know having everything shared I mean you know like you
|
||
|
|
said you having you know your family's contacts in there well that's basically the same you know
|
||
|
|
one precaution you might want to have is say if you have your your your family's phone numbers
|
||
|
|
in your phone you might not want to even say hey this is my whole phone number because somebody
|
||
|
|
finds out that home's phone number finds out more information I mean this is a little bit of
|
||
|
|
digging can get you anywhere right what and Josh here knows that I can't stand like
|
||
|
|
following and I get that damn Google voice I don't like the fact that Google has my number logged
|
||
|
|
in there and who knows what they're doing with that or what they're joining the other databases so
|
||
|
|
phone numbers definitely out personal family information um I don't mind that my sex
|
||
|
|
state was out there being shared that's fine oh you both have seen it I can tell
|
||
|
|
so that all right so that's again everybody's gonna have to make their own decision on how far they
|
||
|
|
want to go with that but again for my aspect I just think the cloud is great technology for
|
||
|
|
the way we're using it it's tremendously helpful it's effective easier to maintain so from
|
||
|
|
uh from uh I guess platform as a service from us just having all our hosting done that they
|
||
|
|
gives us a lot of flexibility um we talked about who owns data already in next again case by case
|
||
|
|
basis with software as a service uh just kind of looking at a couple notes I have here I want to
|
||
|
|
make sure I covered any questions or any things that I heard brought up uh what about well and I
|
||
|
|
guess this is just all we can do about this this thing out loud too is with these software as a
|
||
|
|
service companies if you do use them for a year two years five years um and you uh put your
|
||
|
|
data or information out there let's say iCloud on a personal example or service now or something
|
||
|
|
in a professional environment what do you do after a year when your contract is up do they have
|
||
|
|
your data hostage as i sound going to what are they going to do with the data if I don't renew it
|
||
|
|
do I get to at least download it back to my laptop or my iphone or whatever the case may be or
|
||
|
|
are they holding hostage i mean that's a realistic danger isn't it well in the case of iCloud
|
||
|
|
it's actually um closer to Dropbox where it's syncing your data it sure keeps some of your data
|
||
|
|
in the cloud but it's syncing it to multiple devices that was kind of one the major focuses
|
||
|
|
with iCloud was it wasn't strictly like the google music streaming service where once I put my
|
||
|
|
music up there i can't pull it back down so if I were to put my entire music library up there
|
||
|
|
which mind you um i think it quoted it out for like a week to put all my music up there i wasn't
|
||
|
|
too thrilled about that um but we're looking at the ability to have your data synced across multiple
|
||
|
|
devices with apples iCloud versus another service like google music where that data is
|
||
|
|
up there and who knows what's going to happen to it after you say well i'm not i'm done with
|
||
|
|
that i didn't like it i want my music back um in case for like service now i don't know how they
|
||
|
|
get you your data or if they get me what if you want what if a competitor comes up and you decide
|
||
|
|
to switch i mean you've got to read the fine frame they might have some fee in there that says
|
||
|
|
that yeah you can get it but it cost you ten thousand dollar buy out or something ridiculous i
|
||
|
|
don't know but these are again i'm just throwing out questions that people should ask themselves
|
||
|
|
when it comes to these things think when it comes to cloud computing these are thoughts you need
|
||
|
|
to address and think about upfront before you go committing to the clouds or the software is a
|
||
|
|
service that that type of cloud anyway yeah services owns that data i mean there are some wasn't
|
||
|
|
there some controversy with um was it facebook or was it was it live journal it was one of those
|
||
|
|
sites that um tried to make the claim that anything that you typed and uploaded became their
|
||
|
|
intellectual property that's basically that what i mean are you kidding me they can now if you
|
||
|
|
don't tell them no they can use your pictures for any ads so if you have pictures up there if you
|
||
|
|
didn't go in on the all you can still do it but like on the day that they announced that that
|
||
|
|
option was in there i logged in and checked the box saying don't use my photos for ads or anything
|
||
|
|
of facebook is the one that was going off and saying well you put it here it's ours
|
||
|
|
yeah that but that wasn't it wasn't that way all along right didn't it something they tried to
|
||
|
|
change the terms of service ongoing i mean was it also another facebook controversy where
|
||
|
|
they just decided to take out the privacy like when they're waiting i don't have Facebook so
|
||
|
|
forgive me here um wasn't there a way that they marked it so that you had your account set to
|
||
|
|
private and then they just one day changed and said oh everybody's not public you don't can't
|
||
|
|
said it to private anymore yeah they did that and then gotten big trouble for it too yeah that's
|
||
|
|
what i'm saying like you suddenly you could have been private you could have followed the rules you
|
||
|
|
could have done it and they just changed their mind and midstream i mean that's a huge blow to
|
||
|
|
their credibility and trust level to me i would never try and i i don't trust Facebook that's why
|
||
|
|
i don't have an account yeah they can just change the terms of service it will google did the same
|
||
|
|
thing to me with their ad words and ad sense um granted they didn't like me anyway after presenting
|
||
|
|
adept on about that topic but um even so i was playing with it they would change the terms of
|
||
|
|
service all the time and say you have to accept these new terms of service to continue you have
|
||
|
|
no choice in the matter right so i mean they can change the rule book as the game is playing and
|
||
|
|
that's just a little bit wrong to me so you have to be careful and read all the fine print
|
||
|
|
warnings and in every one of these scenarios right and that's ultimately you have to
|
||
|
|
go based on what you're comfortable with a lot of people you know what they don't care
|
||
|
|
and it's kind of bit them on the high end we could do an entire segment about Facebook and some of
|
||
|
|
the stuff that they've done and how it's impacted people's lives one girl got fired over a
|
||
|
|
comment she posted on Facebook about her boss but um just to plug up open source project that
|
||
|
|
i think should get a lot more notice uh diaspora have you heard of that one uh yeah so
|
||
|
|
uh it's uh open source social network that you control what is shared and what isn't and with
|
||
|
|
whom you want to share it with all right and you host down your own system it's really cool to
|
||
|
|
an alpha phase now remember yes so i look forward to seeing more from things like that not necessarily
|
||
|
|
them but i think that's probably the furthest one along so far well we probably yeah that's
|
||
|
|
probably a different show let's not go too far although if anybody who's related to that project
|
||
|
|
would like to come on episode i would love to hear that so if anybody's involved in that project
|
||
|
|
please do an hbrf7 listen to it um but to bring it back um let let's wrap up with a couple of
|
||
|
|
i think we've kind of hit around them here and there as they came up but let's kind of wrap up
|
||
|
|
and talk about some of the big benefits uh going to a private cloud such as we have done with
|
||
|
|
pin rev we have moved all of pin rev into a private cloud which um without going into details of
|
||
|
|
the hardware behind it we have let's just say we have plenty of hardware and because of the nature
|
||
|
|
of the cloud we have the ability to upgrade it increase it as needed and whenever we want to
|
||
|
|
power we want to we have that flexibility so there's that there's obviously from my standpoint as
|
||
|
|
they and i'm going to i'm going to make a clear delineation here um i'm going to refer to you
|
||
|
|
as the system administrator uh you and i kind of share that responsibility although you're 90%
|
||
|
|
of it easily um so i'm going to think of you as the system administrator uh the service provider
|
||
|
|
i'm going to think of myself simply as the webmaster in this scenario so from my standpoint
|
||
|
|
i don't have to worry about uptime or system maintenance anymore that's your job right so that's
|
||
|
|
a huge benefit i have been using uh as better as grew and grew over the years it got to the point
|
||
|
|
where i and i've said many times i'm not a systemic i can crumble my way through and i can get the
|
||
|
|
job done but not as well as somebody who knows it so we got to a point where we grew too big and i
|
||
|
|
had to say you know what it's time for me to have to pay the extra money to get hosted services
|
||
|
|
but traditional hosted services simply meant i lease a box from a hosting company with whatever
|
||
|
|
specs that we agree on those specs aren't dynamic if i outgrow the box we have to get another box
|
||
|
|
pay the difference pay the money to increase do the migration and move over to said box
|
||
|
|
it's a nightmare and we've done that over the years manage hosting simply man i paid extra to have
|
||
|
|
somebody answer tickets and fix the box when it's broken with the cloud with the way we're set up
|
||
|
|
now we have one system to maintain and what i say we i mean you yeah you know it may be multiple
|
||
|
|
physical boxes but it's one hypervisor i guess and all the VMs inside of it right so that also
|
||
|
|
means i don't have to worry about backups and just ask the first one is disaster recovery
|
||
|
|
that's your baby to deal with too and backups and stuff like that from a webmaster standpoint
|
||
|
|
i can do them just because i'm paranoid and like with the currency but you guys can take care of that
|
||
|
|
you can back it up to the NAS servers take snapshots every i think you're telling me that not all VMs
|
||
|
|
not all hypervisors have this capacity but some do where they'll take snapshots and just store
|
||
|
|
the deltas so that it's quicker and easier to restore in case of problems exactly that's what we run
|
||
|
|
with you guys it's just an automatic system that goes off okay it's that magic time make a snapshot
|
||
|
|
just take the deltas i think a snapshot on average takes about a minute and a half
|
||
|
|
depending on what changes it could take as much as two and a half minutes but to have a backup
|
||
|
|
that i can restore and push you guys back to that state at that exact moment it's well worth you
|
||
|
|
know the minute where it's doing that yeah and and all of those things that i just talked about are
|
||
|
|
the main reasons that i looked into making the switch and making the change but the other one
|
||
|
|
that surprised me and i don't and i can't believe i didn't realize how awesome this was until you
|
||
|
|
and i talked about it um the context was about consolidate mail service but the point that i was
|
||
|
|
getting at is these are all now virtual machines and you can split them up or share them anyway
|
||
|
|
you want to i know we have some dedicated to a certain site or two for the big ones and other
|
||
|
|
ones we still shared on a virtual machine but i can start to create as many virtual machines as
|
||
|
|
i want inside of that private cloud so i can finally i used to register silly domain names and stuff
|
||
|
|
as sandboxes just to play it and just to hack away and install cmss and just you know write code
|
||
|
|
and teach myself and learn stuff will hack for food was one of our funniest ones i registered that
|
||
|
|
as a joke we use that as a project to make it disposable email system and it worked and it
|
||
|
|
stuffed and we we kept it well with this new environment not only can i create VMs on demand
|
||
|
|
to test end of the play into the have a sandbox they won't destroy or hurt anything i'm not
|
||
|
|
going to misconfigure anything or take another site down because i screwed up my sql or php or
|
||
|
|
anything like that but i can have i can put any OS in there that i want right run a windows
|
||
|
|
seven server i don't know windows seven i don't use one those seven i can run a windows
|
||
|
|
environment next to a good to next to a red hat next to a devian next to a slackware all i
|
||
|
|
got to do is create the VM image for it and i can have anything i want inside of this cloud
|
||
|
|
right i don't have to have a separate box no and that's it's one of the things that a lot of people
|
||
|
|
they don't think about because and vault will go off and say i've said this a million times before
|
||
|
|
but every operating system out there has its purpose has a function it wouldn't exist it wouldn't
|
||
|
|
be a living breathing project if it didn't have a function i know some people argue i know
|
||
|
|
later as things bsd's the only way to go but uh i mean there there's a function for just
|
||
|
|
about every os out there if there wasn't it wouldn't still be a living project
|
||
|
|
so it only works on certain oss and stuff too so that's another factor if there's something
|
||
|
|
you need it's only made for one os it sucks but it's a reality
|
||
|
|
yes it is i know there's a story there we'll leave that alone
|
||
|
|
um so we can put up a um we can fire up a uh a box dedicated to uh counter strike or i don't
|
||
|
|
know what's the game of the day fructive nukum 3d got more new stuff yeah that's the funny thing is
|
||
|
|
that i just i i wasn't thinking about that i was just thinking of ease of use using my burden
|
||
|
|
using the load workload on me i wasn't looking at gaining benefits and when i found out that i
|
||
|
|
could have create other VMs and very easily and run them alongside still in the same security
|
||
|
|
infrastructure still sharing the same resources i get that just made me so happy that i kind of
|
||
|
|
since we've done that and you know this we've started getting back into into hacking to be honest
|
||
|
|
i've been kind of retired and i still some some i am i'm actually finding time again now that my burden
|
||
|
|
has been lifted with administrative duties and i have to say thanks to the cloud but also thanks
|
||
|
|
to you guys personally and lunar pages you guys have done too long this thing too just tremendous
|
||
|
|
workload lifted off of me which i appreciate um i'm actually able to get back into doing things
|
||
|
|
we're actually i've been talking to not there for the past week or two we got a couple projects
|
||
|
|
that we are going to work on again we're going to throw some VMs up we're going to start
|
||
|
|
axoring again that's a great feeling i finally can do that and i really feel to be like i have
|
||
|
|
that ability because of the cloud and the nice thing is is if you guys do compromise and
|
||
|
|
completely destroy the virtual machine you guys can have that snapshot okay let's look back we
|
||
|
|
maintain the one that you guys compromised turn that into a data mining system and we bring up
|
||
|
|
another system that's identical to it before it got compromised well and you know there's another
|
||
|
|
little thing too that we've never had the luxury of it's it's probably minor but it's it's more
|
||
|
|
professional to do this um our forum software which is envision board great piece of software
|
||
|
|
but every time a patch or an update comes out we've kind of had to do it in line we've had to
|
||
|
|
do the update right there on a live machine which is obviously dangerous now it's pretty much
|
||
|
|
always worked we've had a few bugs here and there and i'd have to sit down and work for them
|
||
|
|
yeah volts is over here shaking his head i'm sorry volts is over here shaking his head
|
||
|
|
i guess he doesn't like a vision he likes it i like envision i go more with the both and even
|
||
|
|
those usually resource hog but i've had quite my you know share of problems with envision having
|
||
|
|
having the inline going in there for patches yeah and it's you know what we did is we
|
||
|
|
did a whole separate installation under a different account and anytime we have to do one of
|
||
|
|
those we would try to do it in the other account and test it there see if it worked but every time
|
||
|
|
we do them we have to clone over the database copy over the tree all that kind of stuff it's just
|
||
|
|
a lot of work now in this new environment whether it's envisioned people's interp in the
|
||
|
|
number of sports and route there um you can simply clone over your live system and
|
||
|
|
just and it's all from there if it works great you go do it on your live box if it doesn't you
|
||
|
|
have the luxury of taking your time to figure out what went wrong etc etc so that was another
|
||
|
|
unexpected pleasant surprise that i have so we can take a snack of anyone needs it anytime
|
||
|
|
and fire it up is a new VM from so we know you don't have to have an image to build from
|
||
|
|
i don't have to go to an install process i clone one that's already run
|
||
|
|
you know it's like ghost imaging they do that most most big companies now they're not installing
|
||
|
|
everything every time they take an image of one machine and they blow it out to thousands
|
||
|
|
what's the same thing we take an image of what we want and we can blow it out quickly and
|
||
|
|
be open running i mean technology is wonderful i'm a weird voter right now
|
||
|
|
that was a little bit too much i'm not known i think that's a good way to wrap up the show um
|
||
|
|
let's see i think yeah i think we've talked about everything i wanted to bring up i mean
|
||
|
|
but again i can't speak kiley enough of the cloud if it's done well done properly and you
|
||
|
|
understand what's going on with it to reiterate you have to know and ask the right questions
|
||
|
|
and hopefully on this episode of the show we've given you a lot of those questions a lot of
|
||
|
|
things to think about write them down listen show again if you have to and go and if you're looking
|
||
|
|
for cloud computing go to your provider go to the company you're considering and ask these questions
|
||
|
|
and make sure you understand what you're getting into and it will hopefully make life a lot
|
||
|
|
easier for you or you know you're probably going to hear at the end of this episode we finally
|
||
|
|
have a new outro reported that we're going to put in the end of every show and as that will say
|
||
|
|
i'll say now um go to the guys here at lunar pages they will do the job right they have done a
|
||
|
|
great job by us and i cannot endorse them anymore than i do um i think that then great work with
|
||
|
|
us and i am very satisfied with them obviously i'm biased so just ask the right questions of whoever
|
||
|
|
wherever you do go and um i don't know guys is there anything else you guys want to bring up
|
||
|
|
anything i missed or overstated i think you hit the nail in the head i mean it's been a
|
||
|
|
pretty good journey through uh what cloud is i just hope people if they have questions feel
|
||
|
|
free to hit us up because this is what i do all day my official title with the company is cloud
|
||
|
|
specialist so yeah actually you've written a lot of that custom i mean you've written the system
|
||
|
|
almost right um a lot of the underlying scripts i didn't write the hypervisor but the scripts that
|
||
|
|
make use of the hypervisor of the storage of the backup stuff that's that was all stuff that i
|
||
|
|
built together so they can come to acropublicradio.org of course at the site and um you can
|
||
|
|
find just about any contact information there you can also go to binrev.com and the forums there
|
||
|
|
there is a forums thread for every episode of acropublic radio when this gets added to the feed
|
||
|
|
there is a thread created in the hacker media forum and you are more than welcome to go there and
|
||
|
|
post any questions or and follow up any corrections if i misspoke anything like that you can head
|
||
|
|
over to binrev.com and post it there and we will do our best to get back to you and um i think
|
||
|
|
that is it so um Josh votes thank you both very much for being on the show with me and um i think
|
||
|
|
we've already talked about some ideas for future episodes so we will hopefully be hearing from
|
||
|
|
you guys again very soon. All right thanks everybody and thanks for listening to acropublicradio.
|
||
|
|
Thank you. You have been listening to hacker public radio and we hope you enjoyed the episode.
|
||
|
|
hacker public radio is a community project by hackers for hackers from the binary revolution
|
||
|
|
at binrev.com. hpr and all binrev projects are proudly sponsored by lunar pages from shared
|
||
|
|
hosting the custom private clouds but lunar pages.com for all of your hosting needs.
|
||
|
|
Thanks for listening and we look forward to your contribution.
|
||
|
|
Thank you for listening to hacker public radio for more information on the show
|
||
|
|
and how to contribute your own shows visit hackerpublicradio.org
|