Category: Mix
There are many views on what constitutes a Vulnerability Assessment versus a Penetration Test. The main distinction, however, seems to…
Originally from Mike Gancarz’s book, here are the 9 primary tenets of Unix. Small is Beautiful Make Each Program Do…
Upon further reflection, I am going to give OS X at least another revision, i.e. Tiger. I want to go…
It seems many in the academic community are coming out publicly against Wikipedia — which in my opinion is one…
Here’s an analogy for the Windows users trying to fight malware. Imagine that you live in a place where everyone’s…
In another post about culture a friend commented that we must guard against the idea that there is only one…
OrangeDoD Trusted Computer System Evaluation Criteria GreenDoD Password Management Guideline TanA Guide to Understanding Audit in Trusted Systems Bright BlueTrusted…
Mar 12, 2019 — Nothing has helped me more in life than this system. I use it to this day….
This blog post points out some very interesting philisophical issues with Pixar’s new movie “The Incredibles”. I noticed the two…
Below is a list of three articles/stories that every single geek absolutely must be aware of and be willing to…
Well, after reading Linux’s comments on interpreted languages and discussing the matter with Ken some, I have come to the…
Here’s a recent quote from a /. post that I find rather interesting: I work for NASA; almost everyone in…











