Dumping Firefox. Going to Safari.
I tend to prefer debit when purchasing things. It hasn’t really been a security thing for me; it’s been more …
Read MoreCuriosity is the Receptor, Understanding is the Stimuli
Solid analysis from a respected Israeli.
Read MoreShould CISSP’s Know Basic Networking?
Most in the information security community have heard of the “cold-boot” attack against encryption products that was recently released by …
Read MoreScott Adams Says Fossil Evidence is Bullshit, But He Believes in Evolution
I’d say that’s a pretty solid way of approaching entrepreneurship in today’s tech world.
Read MoreRon Paul is Seriously Flawed as a Candidate; We’re Just So in Love With Him That We’re Not Paying Attention
I’ve been thinking a lot recently about the usefulness of risk assessment. A while back I had an interesting conversation …
Read MoreRon Paul is for Real. Let’s Do This.
The information security community is a relatively small one, and it remains so even on the Internet. It feels good …
Read MoreHow To Set Up Subversion
Does anyone else think it’s (shameful | criminal | wrong | outrageous) for Exxon to be making record profits (10.7 …
Read MoreHow I Learned Integrity: A “Don’t Tase Me, Bro” Lesson
I’ve been obsessed with an idea for a while now of a networking and security tool that captures network data …
Read MoreWhy CISSPs DO Need to Be Decently Versed in Technology
Let me just say that I am highly resistant to conspiracy theories in general. I think most of them are …
Read MoreSaying No To “www”: A Fortune 50 Company Analysis
This explains a lot. The Dunning-Kruger effect describes the phenomenon whereby people who don’t know anything about something think they …
Read More












Recent Comments