Aug. 23, 2011 9:06 pm
A relatively new hacker web site has cropped up, but this time it?s less about hacking and more about competition? sort of. RankMyHack.com is a web site where hackers can compete amongst one another for ranking as the top hacker. This is accomplished by earning points for the number and size of the success hacks attributed to the hacker. The web site tracks confirmed hacks, awards points,...? Read?MoreAug. 23, 2011 3:35 pm
As more incidents of hacking, theft, and data loss make the headlines this week, the question remains as to who is responsible for the lapses in Internet security that make it seemingly easy to commit these types of cyber crime. Whether it be the public or private sector organization that was targeted, a government body, an Internet Service Provider, or the throngs of Internet users and...? Read?MoreAug. 21, 2011 8:59 pm
Being an IT consultant in computer networking means passing exams and earning certifications. For an in-house technical resource, having a single IT certification in a given area is sufficient to do the job well. For the IT consultant, however, the name of the game is certifications and experience. A client wants to know that the people handling their systems are highly skilled, possessing a...? Read?MoreAug. 18, 2011 10:28 am
A few days ago I wrote about a piece of my intellectual property, an article I wrote and posted on DaileyMuse.com, being stolen, plagiarized, and posted on another web site under a different authors name. I hadn?t been looking for my work elsewhere, I was simply browsing the access logs and visiting other websites that stood out. As a result of finding my work posted elsewhere without my...? Read?MoreAug. 16, 2011 9:16 pm
I often spend time reviewing my website logs to see who my visitors are, what topics are generating the most interest, and what websites readers are coming from. This evening, while reviewing the activity log, I noticed an entry from a web agent that stood out from the others. This agent stood out from the others not only because it was from a WordPress agent named WordPress/3.1.3;...? Read?MoreAug. 15, 2011 9:58 am
As hacking groups such as Anonymous and LulzSec continue to make headlines, many of us in the Information Security field can only sit back and shake our heads. The large number of successful system breaches, web site defacements, and the publication of confidential data is not at all surprising, and for the most part was only a matter of time. Releasing the personal information of innocent...? Read?MoreAug. 14, 2011 11:11 am
In a short article I wrote earlier this week, entitled ?Social Media, Violence, and Free Speech? , I took aim at British Prime Minister David Cameron and his idea of curtailing online free speech by restricting the use of social media sites to organize protests. In true ?crow eating? fashion, I?m now forced to re-evaluate my position on the matter, thanks in large part to an uneducated, faux...? Read?MoreAug. 13, 2011 9:14 am
It seems that the Linux community is so focused on the competition with Microsoft that any hint of the two mentioned together in an article, blog post, or tweet is immediately circulated around the Internet. In the past day or so the news began to circulate that Wes Miller of Directions on Microsoft had tweeted that Microsoft modified their boilerplate SEC financial filings, and apparently...? Read?MoreAug. 12, 2011 9:10 am
In the wake of the violent rioting that rocked several cities in the United Kingdom, British Prime Minister David Cameron has focused on the social media services Facebook and Twitter as co-conspirators in the civil unrest. Cameron believes that by allowing ?free flow of information?, these services contributed to the civil disobedience that occurred in his country. Cameron stated, ?Free flow of...? Read?MoreAug. 4, 2011 11:40 am
After searching around a bit I was unable to find a place to connect with other bloggers/authors from the technology industry. There are some forums here and there, but nothing dedicated to technology bloggers as a group. To provide such a place, I have created a LinkedIn group entitled Technology Blog Authors and Professionals , providing a resource for technology bloggers and authors to...? Read?MoreAug. 1, 2011 11:07 am
As a technology professional, you will likely take the occasional road trip, but as a technology consultant, travel is a fact of life. Many in our field will spend an average of 45 weeks on the road every year, with 8-10 hours per week spent traveling to and from a client site. Those hours of travel mean airfare, rental cars, and hotel stays, all tallying up the frequent traveler miles and...? Read?MoreJul. 26, 2011 8:09 am
The term security posture is used in information security to describe the overall security effectiveness of a given system, service, or network. All aspects of security strength and weakness are evaluated and weighed against both potential and known threats in an effort to gauge the current level of protection. This same process can be used to develop a "personal" security posture, by assessing...? Read?MoreJul. 22, 2011 9:26 pm
It is well known that Information Technology is a fast paced and ever-changing field. New technologies, updates to software, changing standards, and adoption of emerging solutions are seemingly a weekly occurrence. With this rapid change in technology comes the need to adapt strategies and alter thought processes to align with new technical directions. Unfortunately, the human component can often...? Read?MoreJul. 18, 2011 8:15 pm
Microsoft has offered another $250,000 (USD) reward, this time in exchange for information leading to the identity of those responsible for controlling the notorious Rustock botnet network. In a statement released on the Official Microsoft Blog , Microsoft Senior Attorney Richard Boscovich stated, ?While the primary goal for our legal and technical operation has been to stop and disrupt the...? Read?MoreJul. 12, 2011 6:29 pm
If you?ve worked in the IT field for any length of time you are most likely familiar with the phrase ?thrown under the bus,? which can be defined as meaning ?to sacrifice; to treat as a scapegoat; to betray.? While the exact origin of the phrase is a mystery--for those of us in the information technology field the view of the undercarriage of this particular type of mass-transit vehicle is not. ...? Read?MoreJul. 6, 2011 10:38 pm
A fledgling international cyber security alliance is continuing to gather backing from private business, according to a recent article published on ComputerWeekly.com. The International Cyber Security Protection Alliance (ICSPA) aims to support law enforcement agencies in countries that lack the resources to fight cybercrime. Commercial security organizations such as McAfee and Trend Micro...? Read?MoreJul. 6, 2011 11:39 am
The announcement this week that a team of hackers have began to target the members of another hacking group has put an interesting spin on recently publicized cyber attacks against several organizations. A group calling themselves the ?A-Team? have targeted the members of LulzSec?a group claiming responsibility for many of the latest successful security beaches--in an apparent attempt to reveal...? Read?MoreJul. 4, 2011 11:34 am
33% of people use the same password for every web site they access. 62% do not use complex passwords or change their password frequently. Of the nearly 75 million scam emails sent every day, 2000 claim a victim. 73% of Americans were the victim of some form of cybercrime. 25% of all cybercrime remains unsolved. The total number of incidents recorded in 2010 involving online attacks and computer...? Read?MoreJul. 3, 2011 4:47 pm
As we, here in the United States celebrate our independence this Fourth of July, we are reminded that the liberties and freedoms that come with that independence have yet to be won online. As citizens of this country we are blessed with safety and security from threats both foreign and domestic, but those guarantees have not yet extended to our citizenship in the global Internet community. This...? Read?MoreJul. 2, 2011 11:24 pm
In this multipart series we will be discussing the process and procedure for configuring an iptables firewall under Linux. This series will guide Linux users with any level of networking experience through the entire process of installing and configuring a complete iptables firewall. Included in the final firewall configuration will be leading industry-standard best practices for firewall traffic...? Read?Moremonopoly virginia tech nova mars mars jason momoa man of steel
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.