Monthly Archives: April 2009

5 posts

QuickBooks Loan Manager

 In case you don’t know, QuickBooks Loan Manager provides a great tool to manage loans. I found out about it quite by accident.

One of my clients required a better way to organize and backup QuickBooks. They work with several QuickBooks company files. So, I restructured the folder hierarchy, configured a seven day QuickBooks staggered backup then integrated it with their tape backup on another server.

During the last step involving checking my work, I discovered that the QuickBooks Loan Manager screen in each company file was blank. After poking around some, I figured out that the QuickBooks Loan Manager files are not included in the QuickBooks Backup (.QBB) file.

Typically, I backup the entire folder that contains the company files. So, I returned to the backup and then I copied the old .lmr file into the new location for company files, returning the loan manager to full functionality.

The lesson here, backup your entire company files folder. Several components will not restore properly if you use only the .QBB file. I learned about QuickBooks Loan Manager today. I learned about QuickBooks Shipping Manager some time ago.

Are You Ready For QuickBooks Multi User?

Visit painlessquickbooks.com to find out.

Cyber Security?

Have you read the latest news about “Cyber Security”

Homeland Security Dept. Seeking Computer Hackers To Help Secure Federal Systems

Secret White House Helicopter Data Found On A Computer In Iran?

Chinese, Russian hackers ‘probing US power grid

So now we are going to hire “hackers” who by definition are criminal by nature to help “Secure Federal Systems”  I can hardly believe this is real.

A quick look at the “hacker jobs” listed at the General Dynamics Advanced Information Systems Information Technology “Functional Area” referenced in the article, tells a potential enemy most of everything they would need to know to begin mounting an assault on government systems.

Who in their right mind would publish top secret detailed job descriptions like this to the Internet?

Do you know that our government uses the SUN Identity Management Suite specifically Sun Identity Manager and Sun Access Manager to manage security to government systems? A mediocre Chinese computer scientist could easily have obtained the information to piece together the architecture of a “secure” systems deployment.

If that’s not bad enough, the Chinese computer scientist can just as easily route TCP/IP packets to our government networks for the purposes of probing and discovery, because we both utilize TCP/IP.

But, our government networks are protected by sophisticated firewalls, content filtering and intrusion protection, all designed and coded by computer engineers from China, India and other countries around the world.

When it comes to Government Information Technology and so called “Cyber Security”, we are suffering from a serious case of extreme stupidity.

This entire Internet paradigm needs to go, before we loose both our infrastructure as in water, electricity and communications as well as our military competitive edge. We are wide open here.

We need to get government data and communications off of the Internet, now!

The Deal With Lightning

So a lot of you have asked me “What’s your deal with lightning?”

Well, my wife and I have a nice shower in the master bath. It’s rather large, white tile, gold fixtures, nothing real fancy, just run of the mill nice, sitting next to a large tub below a frosted arched window.

Like a lot of people that grew up in North Texas, we are concerned and like to keep an eye on the weather, fully aware that Mother Nature can put on quite a nice show.

So, how is our shower and the weather related? Several years ago on a beautiful sunny late afternoon, we were watching an impressive thunderstorm approaching from many miles to the west. Then, out of the blue, we suddenly experienced a blinding flash and violent explosion, one that would forever change our lives.

The lightning ran through a tree, hit the gutter on the northeast corner of the house, ran sixty feet down the gutter and blasted through our frosted arched bathroom window on the north side of the house, arced across the bathroom hitting our gold shower head, traveled throughout our copper plumbing in the concrete foundation and blasted out of the south side of the house, leaving in its wake, water pouring out of the south side of the house and fire burning on the north side of the house.

Within an instant, we went from sitting on the sofa on the west side of the house to standing next to the front door on the east side of the house. We have no memory of moving from one place to another. Our teen aged son rounded the hallway corner headed to the front door at full speed, fleeing flying sparks and what appeared to be plasma floating through his bedroom.

The engineer and lightning specialist assigned to evaluate the extensive damage sustained by our house several weeks after the strike ventured the likelyhood that our house was hit by a form of lightning called “a bolt from the blue” or “positive lightning” a highly damaging and dangerous form of lightning “typically six to ten times more powerful” than normal lightning.

There’s plenty more to the story, but lets just say that almost a year passed before we could move back into our home. That fatefull lightning strike took out all of our personal computing equipment containing the current project proposals and work inquiries I was working on.

All of my years of preaching about data backups and recovery methods came back to me in full force. Fate handed me the ultimate data recovery operation, all of our personal business.

The second bit of good news regarding the entire lightening experience arrived when I completed the recovery operation the very next evening without a single bit of lost data. Even the project that I walked away from, to watch the beautiful approaching thunderstorm, was fully recoverable thanks to CDP, Continual Data Protection.

The first bit of good news arrived moments after the strike when we realized all three of us survived this unbelievable event alive. 

That’s my deal with lightning! Are you sure your backup works?

QuickBooks Backup Fully Automated

I’ve seen a lot of pain lately. The latest, a small company assuming their nightly backup was working correctly, until they found out the hard way. It seems to me that loss of business data always involves QuickBooks, so I created a short film instructing users on automating their backups.

This process keeps seven days of company files available for recovery in an online location, out of your building. Seven days helps to alleviate the problem of catastrophic data entry errors, allowing a business to revert back to a previous day’s company files.  

As I’ve repeatedly said, test your backup at least once a month. Do a complete trial recovery. If you don’t know how to do that, contact me. I can use the work.

Now the film.

Are You Ready For QuickBooks Multi User?

Visit painlessquickbooks.com to find out.

Content Filtering and Censorship

Look at the area above “Popular Articles” at the top right on my home page. Do you see a green advertisement for Mozy, the world’s largest online backup service or do you see a small block with a red “X” in it, like the picture here?

If you see the red “X” then welcome to Internet censorship. I’ve known about and installed website content filtering for years. However, Internet censorship hit home with me when I browsed to my blog to check out a tool listed on my resource page. I could not access the tool. I was on a free public hot-spot preparing to help out an associate with the “questionable” and consequently censored tool, a basic online backup service.

I even lost access to my online whiteboard.. at a public hotspot.. where I needed it for a meeting.

Somehow, this does not feel right on many levels.

What are your experiences with censorship and what do we need to do about it?