<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Great Read | KC's Blog</title>
	<atom:link href="https://www.kjctech.net/tag/great-read/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.kjctech.net</link>
	<description></description>
	<lastBuildDate>Tue, 24 Jan 2023 18:21:01 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://i0.wp.com/www.kjctech.net/wp-content/uploads/2016/12/cropped-KC-Logo.png?fit=32%2C32&#038;ssl=1</url>
	<title>Great Read | KC's Blog</title>
	<link>https://www.kjctech.net</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">24634607</site>	<item>
		<title>Rules to Choose a Secure Strong Password</title>
		<link>https://www.kjctech.net/rules-to-choose-a-secure-strong-password/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=rules-to-choose-a-secure-strong-password</link>
					<comments>https://www.kjctech.net/rules-to-choose-a-secure-strong-password/#respond</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Wed, 05 Jul 2017 21:32:24 +0000</pubDate>
				<category><![CDATA[Stuff in General]]></category>
		<category><![CDATA[Great Read]]></category>
		<category><![CDATA[password]]></category>
		<guid isPermaLink="false">http://www.kjctech.net/?p=3537</guid>

					<description><![CDATA[<p>The age-old password rules have changed dramatically over the years and are barely relevant in the modern days, many thanks to the hackers that keep their weapon sharpened when it comes to cracking passwords. Here are a few good readings and materials that summarize very well how to choose a good, strong and secure password in the modern world. How [&#8230;]</p>
The post <a href="https://www.kjctech.net/rules-to-choose-a-secure-strong-password/">Rules to Choose a Secure Strong Password</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p>The age-old password rules have changed dramatically over the years and are barely relevant in the modern days, many thanks to the hackers that keep their weapon sharpened when it comes to cracking passwords.</p>
<p>Here are a few good readings and materials that summarize very well how to choose a good, strong and secure password in the modern world.</p>
<h2>How Secure Your Password is?</h2>
<p>Let&#8217;s head over to <a href="https://howsecureismypassword.net/" target="_blank" rel="noopener noreferrer">How Secure is My Password</a> to find out.</p>
<p><a href="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/07/How-Secure-Is-My-Password_.png" data-rel="lightbox-image-0" data-rl_title="" data-rl_caption="" title=""><img data-recalc-dims="1" fetchpriority="high" decoding="async" class="alignnone size-large wp-image-3538" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/07/How-Secure-Is-My-Password_-600x262.png?resize=600%2C262" alt="" width="600" height="262" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/07/How-Secure-Is-My-Password_.png?resize=600%2C262&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/07/How-Secure-Is-My-Password_.png?resize=250%2C109&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/07/How-Secure-Is-My-Password_.png?resize=450%2C196&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/07/How-Secure-Is-My-Password_.png?resize=768%2C335&amp;ssl=1 768w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/07/How-Secure-Is-My-Password_.png?resize=700%2C305&amp;ssl=1 700w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/07/How-Secure-Is-My-Password_.png?resize=520%2C227&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/07/How-Secure-Is-My-Password_.png?resize=360%2C157&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/07/How-Secure-Is-My-Password_.png?resize=100%2C44&amp;ssl=1 100w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/07/How-Secure-Is-My-Password_.png?w=1089&amp;ssl=1 1089w" sizes="(max-width: 600px) 100vw, 600px" /></a></p>
<h2>Bruce Schneier&#8217;s Choosing a Secure Password</h2>
<p>The article was published in 2014 but still relevant in today&#8217;s world. It lays out several studies on password strength and simply points out that</p>
<blockquote>
<p>Pretty much anything that can be remembered can be cracked.</p>
</blockquote>
<p>But there is still one scheme that seems to work, so-called &#8220;Schneier scheme&#8221;:</p>
<blockquote>
<p>So if you want your password to be hard to guess, you should choose something that this process will miss. My advice is to take a sentence and turn it into a password. Something like &#8220;This little piggy went to market&#8221; might become &#8220;tlpWENT2m&#8221;. That nine-character password won&#8217;t be in anyone&#8217;s dictionary. Of course, don&#8217;t use this one, because I&#8217;ve written about it. Choose your own sentence &#8211; something personal.</p>
</blockquote>
<p>For example:</p>
<ul>
<li>WIw7,mstmsritt&#8230; = When I was seven, my sister threw my stuffed rabbit in the toilet.</li>
<li>Wow&#8230;doestcst = Wow, does that couch smell terrible.</li>
<li>Ltime@go-inag~faaa! = Long time ago in a galaxy not far away at all.</li>
</ul>
<p>Schneier also adds a few more rules on top of how to choose a good password:</p>
<ol>
<li><strong>Never reuse a password you care about.</strong> Even if you choose a secure password, the site it&#8217;s for could leak it because of its own incompetence. You don&#8217;t want someone who gets your password for one application or site to be able to use it for another.</li>
<li><strong>Don&#8217;t bother updating your password regularly.</strong> Sites that require 90-day—or whatever—password upgrades do more harm than good. Unless you think your password might be compromised, don&#8217;t change it.</li>
<li><strong>Beware the &#8220;secret question.&#8221;</strong> You don&#8217;t want a backup system for when you forget your password to be easier to break than your password. Really, it&#8217;s smart to use a password manager. Or to write your passwords down on a piece of paper and <i>secure that piece of paper</i>.</li>
<li>One more piece of advice: if a site offers <strong>two-factor authentication</strong>, seriously consider using it. It&#8217;s almost certainly a security improvement.</li>
</ol>
<p>Source: <a href="https://www.schneier.com/essays/archives/2014/02/choosing_a_secure_pa.html" target="_blank" rel="noopener noreferrer">https://www.schneier.com/essays/archives/2014/02/choosing_a_secure_pa.html</a></p>
<h2>Jeff Atwood&#8217;s Password Rules are Bullshit</h2>
<p>TL;DR: There is one rule to bring them all, and in the darkness bind them, the length. Whatever you want, just make sure it&#8217;s long enough to be a reasonable password.</p>
<p>In detail,</p>
<ol>
<li>Password rules are bullshit
<ul>
<li>They don&#8217;t work.</li>
<li>They heavily penalize your ideal audience, people that use real random password generators. Hey, guess what, that password randomly <em>didn&#8217;t</em> have a number or symbol in it. I just double checked my math textbook, and yep, it&#8217;s possible. I&#8217;m pretty sure.</li>
<li>They frustrate average users, who then become uncooperative and use &#8220;creative&#8221; workarounds that make their passwords <em>less</em> secure.</li>
<li>They are often wrong, in the sense that the rules chosen are grossly incomplete and/or insane, per the many shaming links I&#8217;ve shared above.</li>
<li>Seriously, for the <em>love of God</em>, stop with this arbitrary password rule nonsense already. If you won&#8217;t take my word for it, read <a href="https://nakedsecurity.sophos.com/2016/08/18/nists-new-password-rules-what-you-need-to-know/">this 2016 NIST password rules recommendation</a>. It&#8217;s right there, &#8220;no composition rules&#8221;. However, I do see one error, it should have said &#8220;no <em>bullshit</em> composition rules&#8221;.</li>
</ul>
</li>
<li>Enforce a minimum Unicode password length
<ul>
<li>It&#8217;s simple. Users can count. Most of them, anyway.</li>
<li>It works. The data <em>shows us</em> it works; just download any common password list of your choice and group by password length.</li>
<li>The math doesn&#8217;t lie. All other things being equal, a longer password <em>will</em> be more random – and thus more secure – than a short password.</li>
<li>Accept that even this one rule isn&#8217;t inviolate. A minimum password length of 6 on a Chinese site <em>might</em> be perfectly reasonable. A 20 character password <em>can</em> be ridiculously insecure.</li>
<li>If you don&#8217;t allow (almost) every single Unicode character in the password input field, you are probably doing it wrong.</li>
<li>It&#8217;s a bit of an implementation detail, but make sure <em>maximum</em> password length is reasonable as well.</li>
</ul>
</li>
<li>Check for common passwords</li>
<li>Check for basic entropy</li>
<li>Check for special case passwords</li>
</ol>
<p>Source: <a href="https://blog.codinghorror.com/password-rules-are-bullshit/" target="_blank" rel="noopener noreferrer">https://blog.codinghorror.com/password-rules-are-bullshit/</a></p>
<p>Two more bonus readings from Jeff: <a href="https://blog.codinghorror.com/hacker-hack-thyself/" target="_blank" rel="noopener noreferrer">Hacker, Hack Thyself</a> &amp; <a href="https://blog.codinghorror.com/the-god-login/" target="_blank" rel="noopener noreferrer">The God Login</a>.</p>
<h2>Troy Hunt on Password Strength Indicators</h2>
<p>Troy uses a true sample to demonstrate why Password Strength Indicators sometimes help people choose dumb choices, and points out that</p>
<blockquote>
<p>Password strength meters which simply run JavaScript in the client and apply basic mathematics are woefully inadequate. Likewise, websites applying similar maths to enforce &#8220;strong&#8221; passwords in no way guarantee that <em>actual</em> strong passwords will be chosen. All these calculators neglect the human element of passwords and that&#8217;s an <em>enormously</em> important part of the picture.</p>
</blockquote>
<p>He also suggests:</p>
<blockquote>
<p>Fundamentally, it&#8217;s an education issue and the key tenets people need to understand boil down to the risks of password reuse and, of course, what <em>genuinely</em> constitutes a strong password.</p>
</blockquote>
<p>Source: <a href="https://www.troyhunt.com/password-strength-indicators-help-people-make-dumb-choices/" target="_blank" rel="noopener noreferrer">https://www.troyhunt.com/password-strength-indicators-help-people-make-dumb-choices/</a></p>
<h2>UK NCSC&#8217;s Password Guidance</h2>
<p>The UK NCSC (part of GCHQ &#8211; Uk equiv to NSA) published a good discussion document a while back that contains some useful password guidance that simplifies the password policy, including:</p>
<ol>
<li>Change all factory-set default passwords.</li>
<li>Take advantage of good password manager software.</li>
<li>Eliminate password expiry policy to avoid placing more burden on users.</li>
<li>No sharing passwords</li>
<li>Use technical controls to defend against automated guessing attacks, rather than relying on users to generate complex passwords.</li>
<li>Never re-use passwords between work and home.</li>
<li>Account lockout, throttling, and protective monitoring are powerful defenses against brute-force attacks on enterprise systems and online services.</li>
<li>Never store passwords as plain text, always hashing and salting before storing them.</li>
</ol>
<p>Source: <a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/458857/Password_guidance_-_simplifying_your_approach.pdf" target="_blank" rel="noopener noreferrer">UK NCSC&#8217;s Password Guidance</a></p>
<h2>Microsoft Password Guidance</h2>
<p>It provides Microsoft&#8217;s recommendations for password management based on current research and lessons from their own experience as one of the largest Identity Providers in the world.</p>
<p>Here is some advice to IT admins:</p>
<ul>
<li>Maintain an 8-character minimum length requirement (and longer is not necessarily better).</li>
<li>Eliminate character-composition requirements.</li>
<li>Eliminate mandatory periodic password resets for user accounts.</li>
<li>Ban common passwords, to keep the most vulnerable passwords out of your system.</li>
<li>Educate your users not to reuse their password for non-work-related purposes.</li>
<li>Enforce registration for multi-factor authentication.</li>
<li>Enable risk-based multi-factor authentication challenges</li>
</ul>
<p>Source: <a href="https://www.microsoft.com/en-us/research/wp-content/uploads/2016/06/Microsoft_Password_Guidance-1.pdf" target="_blank" rel="noopener noreferrer">Microsoft Password Guidance</a></p>


<h2 class="wp-block-heading">Security Baseline for Windows 10 and Server v1903</h2>



<p>The new Windows Feature Update brings very few new Group Policy settings but the new draft baseline did drop a few policies that were recommended before. One of them is the dropping of the password-expiration polices that require periodic password changes.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p> <strong><em>Why are we removing password-expiration policies?</em></strong><br><em>First, to try to avoid inevitable misunderstandings, we are talking here </em>only <em>about removing password-expiration policies – we are not proposing changing requirements for minimum password length, history, or complexity.</em><br>Periodic password expiration is a defense <em>only</em> against the probability that a password (or hash) will be stolen during its validity interval and will be used by an unauthorized entity. If a password is never stolen, there’s no need to expire it. And if you have evidence that a password has been stolen, you would presumably act immediately rather than wait for expiration to fix the problem.<br>If it’s a given that a password is likely to be stolen, how many days is an acceptable length of time to continue to allow the thief to use that stolen password? The Windows default is 42 days. Doesn’t that seem like a <em>ridiculously long time</em>? Well, it is, and yet our current baseline says 60 days – and used to say 90 days – because forcing frequent expiration introduces its own problems. And if it’s <em>not</em> a given that passwords will be stolen, you acquire those problems for no benefit. Further, if your users are the kind who are willing to answer surveys in the parking lot that exchange a candy bar for their passwords, no password expiration policy will help you.<br>Our baselines are intended to be usable with minimal if any modification by most well-managed, security-conscious enterprises. They are also intended to serve as guidance for auditors. So, what should the recommended expiration period be? If an organization has successfully implemented banned-password lists, multi-factor authentication, detection of password-guessing attacks, and detection of anomalous logon attempts, do they need <em>any</em> periodic password expiration? And if they haven’t implemented modern mitigations, how much protection will they <em>really</em> gain from password expiration?<br>The results of baseline compliance scans are usually measured by how many settings are out of compliance: “How much red do we have on the chart?” It is not unusual for organizations during audit to treat compliance numbers as more important than real-world security. If a baseline recommends 60 days and an organization with advanced protections opts for 365 days – or no expiration at all – they will get dinged in an audit unnecessarily and might be compelled to adhere to the 60-day recommendation.<br>Periodic password expiration is an ancient and obsolete mitigation of very low value, and we don’t believe it’s worthwhile for our baseline to enforce any specific value. By removing it from our baseline rather than recommending a particular value or no expiration, organizations can choose whatever best suits their perceived needs without contradicting our guidance. At the same time, we must reiterate that we <em>strongly</em> recommend additional protections even though they cannot be expressed in our baselines. </p></blockquote>



<p>Source: <a href="https://blogs.technet.microsoft.com/secguide/2019/04/24/security-baseline-draft-for-windows-10-v1903-and-windows-server-v1903/">Security baseline (DRAFT) for Windows 10 v1903 and Windows Server v1903</a></p>The post <a href="https://www.kjctech.net/rules-to-choose-a-secure-strong-password/">Rules to Choose a Secure Strong Password</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/rules-to-choose-a-secure-strong-password/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3537</post-id>	</item>
		<item>
		<title>Network Protocol for Anyone Who Knows A Programming Language</title>
		<link>https://www.kjctech.net/network-protocol-for-anyone-who-knows-a-programming-language/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=network-protocol-for-anyone-who-knows-a-programming-language</link>
					<comments>https://www.kjctech.net/network-protocol-for-anyone-who-knows-a-programming-language/#respond</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Tue, 13 Jun 2017 04:37:41 +0000</pubDate>
				<category><![CDATA[Network]]></category>
		<category><![CDATA[Great Read]]></category>
		<category><![CDATA[Network Protocol]]></category>
		<guid isPermaLink="false">http://www.kjctech.net/?p=3500</guid>

					<description><![CDATA[<p>The network stack does several seemingly impossible things. It does reliable transmission over our unreliable networks, usually without any detectable hiccups. It adapts smoothly to network congestion. It provides addressing to billions of active nodes. It routes packets around damaged network infrastructure, reassembling them in the correct order on the other side even if they arrived out of order. It [&#8230;]</p>
The post <a href="https://www.kjctech.net/network-protocol-for-anyone-who-knows-a-programming-language/">Network Protocol for Anyone Who Knows A Programming Language</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p><a href="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/06/network-cable-ethernet-computer-159304.jpeg" data-rel="lightbox-image-0" data-rl_title="" data-rl_caption="" title=""><img data-recalc-dims="1" decoding="async" class="alignnone wp-image-3502 size-full" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/06/network-cable-ethernet-computer-159304.jpeg?resize=640%2C427" alt="" width="640" height="427" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/06/network-cable-ethernet-computer-159304.jpeg?w=1920&amp;ssl=1 1920w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/06/network-cable-ethernet-computer-159304.jpeg?resize=250%2C167&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/06/network-cable-ethernet-computer-159304.jpeg?resize=450%2C300&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/06/network-cable-ethernet-computer-159304.jpeg?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/06/network-cable-ethernet-computer-159304.jpeg?resize=600%2C400&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/06/network-cable-ethernet-computer-159304.jpeg?resize=700%2C467&amp;ssl=1 700w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/06/network-cable-ethernet-computer-159304.jpeg?resize=520%2C347&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/06/network-cable-ethernet-computer-159304.jpeg?resize=360%2C240&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/06/network-cable-ethernet-computer-159304.jpeg?resize=100%2C67&amp;ssl=1 100w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/06/network-cable-ethernet-computer-159304.jpeg?w=1280&amp;ssl=1 1280w" sizes="(max-width: 640px) 100vw, 640px" /></a></p>
<p>The network stack does several seemingly impossible things. It does reliable transmission over our unreliable networks, usually without any detectable hiccups. It adapts smoothly to network congestion. It provides addressing to billions of active nodes. It routes packets around damaged network infrastructure, reassembling them in the correct order on the other side even if they arrived out of order. It accommodates esoteric analog hardware needs, like balancing the charge on the two ends of an Ethernet cable. This all works so well that users never hear of it, and even most programmers don&#8217;t know how it works.</p>
<p>Read more <a href="https://www.destroyallsoftware.com/compendium/network-protocols?share_key=97d3ba4c24d21147">here</a>.</p>The post <a href="https://www.kjctech.net/network-protocol-for-anyone-who-knows-a-programming-language/">Network Protocol for Anyone Who Knows A Programming Language</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/network-protocol-for-anyone-who-knows-a-programming-language/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3500</post-id>	</item>
		<item>
		<title>Extreme IT: What if Your IT Office was in A War Zone?</title>
		<link>https://www.kjctech.net/extreme-it-what-if-your-it-office-was-in-a-war-zone/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=extreme-it-what-if-your-it-office-was-in-a-war-zone</link>
					<comments>https://www.kjctech.net/extreme-it-what-if-your-it-office-was-in-a-war-zone/#respond</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Tue, 06 Jun 2017 15:47:46 +0000</pubDate>
				<category><![CDATA[Stuff in General]]></category>
		<category><![CDATA[Extreme IT]]></category>
		<category><![CDATA[Great Read]]></category>
		<guid isPermaLink="false">http://www.kjctech.net/?p=3494</guid>

					<description><![CDATA[<p>Spiceworks has a new series called Extreme IT and it has a pretty special topic in May just to honor the military sector and the work IT pros offered in that area. Quite interesting read. Here are some of the highlights: The differences between military and civilian IT In the military, the scale of IT is larger. In the military, the [&#8230;]</p>
The post <a href="https://www.kjctech.net/extreme-it-what-if-your-it-office-was-in-a-war-zone/">Extreme IT: What if Your IT Office was in A War Zone?</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p>Spiceworks has a new series called Extreme IT and it has a pretty special topic in May just to honor the military sector and the work IT pros offered in that area. Quite interesting read.</p>
<p><a href="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/06/navy_computer_technician_IT_military.jpg" data-rel="lightbox-image-0" data-rl_title="" data-rl_caption="" title=""><img data-recalc-dims="1" decoding="async" class="alignnone size-large wp-image-3495" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/06/navy_computer_technician_IT_military-600x378.jpg?resize=600%2C378" alt="" width="600" height="378" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/06/navy_computer_technician_IT_military.jpg?resize=600%2C378&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/06/navy_computer_technician_IT_military.jpg?resize=250%2C157&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/06/navy_computer_technician_IT_military.jpg?resize=450%2C283&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/06/navy_computer_technician_IT_military.jpg?resize=700%2C441&amp;ssl=1 700w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/06/navy_computer_technician_IT_military.jpg?resize=520%2C327&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/06/navy_computer_technician_IT_military.jpg?resize=360%2C227&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/06/navy_computer_technician_IT_military.jpg?resize=100%2C63&amp;ssl=1 100w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/06/navy_computer_technician_IT_military.jpg?w=715&amp;ssl=1 715w" sizes="(max-width: 600px) 100vw, 600px" /></a></p>
<p>Here are some of the highlights:</p>
<ul>
<li>The differences between military and civilian IT
<ul>
<li>In the military, the scale of IT is larger.</li>
<li>In the military, the work pressure can be extreme.</li>
<li>In military IT, the operating environment can be very harsh.</li>
<li>In the military, the tech is often bigger and badder.</li>
<li>In the military, processes are extremely regimented.</li>
<li>The workforce skews are very young, about half of the enlisted members are under the age of 25.</li>
</ul>
</li>
<li>Some things about life in IT are universal</li>
</ul>
<p>/via <a href="https://community.spiceworks.com/topic/1998382-extreme-it-veterans-sound-off-on-military-information-technology-challenges/">Spiceworks</a>/</p>The post <a href="https://www.kjctech.net/extreme-it-what-if-your-it-office-was-in-a-war-zone/">Extreme IT: What if Your IT Office was in A War Zone?</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/extreme-it-what-if-your-it-office-was-in-a-war-zone/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3494</post-id>	</item>
		<item>
		<title>An Epic Beat-down of Critical Inner Self</title>
		<link>https://www.kjctech.net/an-epic-beat-down-of-critical-inner-self/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=an-epic-beat-down-of-critical-inner-self</link>
					<comments>https://www.kjctech.net/an-epic-beat-down-of-critical-inner-self/#respond</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Sun, 05 Feb 2017 20:54:21 +0000</pubDate>
				<category><![CDATA[Stuff in General]]></category>
		<category><![CDATA[Great Read]]></category>
		<guid isPermaLink="false">http://www.kjctech.net/?p=3448</guid>

					<description><![CDATA[<p>A great write-up from a 56-year-old cool dude who decided to start learning to code: I’m 56 years old and learning to code. Why? Because I love it. And I’ve got a knack for it. That doesn’t mean it’s easy. It’s hard. And that’s OK. I love losing myself in an algorithm challenge. I love squeezing in a few extra [&#8230;]</p>
The post <a href="https://www.kjctech.net/an-epic-beat-down-of-critical-inner-self/">An Epic Beat-down of Critical Inner Self</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p>A great write-up from a 56-year-old cool dude who decided to start learning to code:</p>
<blockquote>
<p id="92cb" class="graf graf--p graf-after--figure">I’m 56 years old and learning to code.</p>
<p id="132e" class="graf graf--p graf-after--p">Why? Because I love it. And I’ve got a knack for it.</p>
<p id="9989" class="graf graf--p graf-after--p">That doesn’t mean it’s easy. It’s hard. And that’s OK.</p>
<p id="1b65" class="graf graf--p graf-after--p">I love losing myself in an algorithm challenge. I love squeezing in a few extra minutes testing just one more thing. I love thinking “maybe I’ve got it this time.” And getting to “Yes! It finally works!”</p>
<p id="757c" class="graf graf--p graf-after--p"><span class="markup--quote markup--p-quote is-other" data-creator-ids="anon">But here’s the thing. I’ve never been one for hobbies. I don’t like activities that don’t pay. I can’t keep on doing something simply for the fun of it.</span></p>
<p id="037c" class="graf graf--p graf-after--p">What I work on during my off time has to have some economic upside for me.</p>
<p id="aa6e" class="graf graf--p graf-after--p">OK, coding pays. It can pay big. So what’s the problem?</p>
<p id="41d9" class="graf graf--p graf-after--p">Well, before I could fully embrace myself as a 56-year-old programming rookie, I had to deal with my <strong class="markup--strong markup--p-strong">Critical Inner Self</strong> (let’s call him CIS for short).</p>
<p id="d2b4" class="graf graf--p graf-after--p">Learning all this stuff is hard enough without my CIS whispering in my ear the whole time.</p>
<p id="b059" class="graf graf--p graf-after--p">If I can give my CIS an epic beat-down, then I should be able to handle anyone who appears to work on his behalf. And these agents of CIS often appear out of no where, asking critical questions.</p>
</blockquote>
<p class="graf graf--p graf-after--p">/via <a href="https://medium.freecodecamp.com/yes-im-56-and-learning-to-code-f33abea6fd4c#.c6eitd6x5" target="_blank" rel="noopener">freeCodeCamp</a> at Medium/</p>The post <a href="https://www.kjctech.net/an-epic-beat-down-of-critical-inner-self/">An Epic Beat-down of Critical Inner Self</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/an-epic-beat-down-of-critical-inner-self/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3448</post-id>	</item>
	</channel>
</rss>
