-
Recent Posts
Recent Comments
Andrea Lahti on Some new stuff Elephant on Review of Eric Foner’s R… ordo tacitus on Review of Eric Foner’s R… Elephant on Review of Eric Foner’s R… Elephant on Review of Brian M. Linn’… Blogroll
Tags
- Afghanistan
- al-shabaab
- analysis
- android
- bias
- biology
- book review
- Business
- byod
- cats
- chen style
- coffee
- coldfusion
- computers
- crowd sourcing
- d13
- data
- defense
- development
- economics
- education.
- encryption
- exercise
- fallacies
- fitness
- flask
- future
- futurism
- gaming
- Glass
- hacking
- history
- hopology
- humour
- innovation
- intel
- internet
- java
- law
- lean
- legal
- martial arts
- math
- mathematics
- medicine
- military history
- mobile
- news
- opinion
- physics
- politics
- privacy
- programing
- programming
- python
- R
- research
- scotch
- secret key
- security
- social media
- space
- space technology
- space travel
- tablets
- terrorism
- testing
- thinking
- training
- visualization
- war
- windows
- wireless
- xbox
Archives
- January 2022
- June 2021
- February 2021
- January 2021
- December 2019
- November 2019
- October 2019
- September 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- July 2017
- February 2017
- November 2016
- July 2016
- April 2016
- May 2015
- April 2015
- February 2015
- January 2015
- December 2014
- October 2014
- September 2014
- August 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
Categories
Meta
Tag Archives: security
Troy Hunt: The mechanics of the iCloud “hack” and how iOS devices are being held to ransom
Troy Hunt: The mechanics of the iCloud “hack” and how iOS devices are being held to ransom Really good write up of the iCloud ransom attacks. That being said I think there is a lot more to be said here … Continue reading
Twitter / robi_sen: Short history of Boko Haram …
Twitter / robi_sen: Short history of Boko Haram …
Twitter / robi_sen: Interesting malicious iOS plugin …
Twitter / robi_sen: Interesting malicious iOS plugin … Interesting malicious iOS plugin
Two-Factor Authentication is not a Silver Bullet
Matt Asay at readwrite.com points to Adobe’s recent security breach as why we need to increase the implementation of Two-Factor Authentication. He points out in his post that many of the passwords in the Adobe leaked dataset were rather weak … Continue reading
Microsoft’s Enhanced Mitigation Experience Toolkit EMET 4.1 is out
This can be a really useful tool to enhance your MS servers security “Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) 4.1 released” http://feedly.com/k/1cVlGXh
Worth while simple security steps
Here are some good and very simple security habits that will protect you from most basic attacks. “Seven Habits for the Security Conscious | SecurityWeek.Com” http://feedly.com/k/19Gv6hg
Adafruit tutorial turns your Raspberry Pi into an ad-blocking WiFi access point
This would be a fun little project to teach young students or kids about networking, privacy, and security. Very cool. Adafruit tutorial turns your Raspberry Pi into an ad-blocking WiFi access point.
GOOGLE: If You Use Gmail, You Have ‘No Legitimate Expectation Of Privacy’ – SFGate
Ive been telling people this for years. Especially large companies. GOOGLE: If You Use Gmail, You Have ‘No Legitimate Expectation Of Privacy’ – SFGate.
Meru Cabs Launches Smartphone Apps With Emergency Distress Button
“India’s Meru Cabs Launches Smartphone Apps With Emergency Distress Button” http://feedly.com/k/16zQ1Dm
citeseerx.ist.psu.edu/viewdoc/download?rep=rep1&type=pdf&doi=10.1.1.131.9449
This is some interesting research and relevant to some of my research: Secure wireless communications is a challenging problem due to the shared nature of the wireless medium. Most existing security protocols apply cryptographic techniques for bit scrambling at the application … Continue reading