Security: Identification, Authentication, and Authorization
Many grapple with the concept of authentication in information security. What tends to happen is that they confuse authentication with...
Read more →Many grapple with the concept of authentication in information security. What tends to happen is that they confuse authentication with...
Read more →I’ve had what I think is a good definition for AGI for a while now, but ASI has been more...
Read more →You’d think certain things would come second nature to a major OS — things like network connection handling or returning...
Read more →I was looking for a bookmark of mine on delicious a moment ago and did so in a very primitive...
Read more →I was having some issues involving losing connectivity to a system of mine due to a dynamic IP. Normally one...
Read more →One of the coolest (yet little-known) features in Firefox is the ability to search virtually any website via your address...
Read more →I’ve always heard two things about IT consultants — 1. they make tons of money, and 2. they don’t know...
Read more →As we all know, tons of people are having their identities stolen — the most recent story involving over 600,000...
Read more →I’m suddenly re-pissed off about John Boyega’s character in Star Wars. But way worse than before because it’s all much...
Read more →If you’re like me (which you likely are since you’re reading this), you’re probably obsessed with GTD, Lifehacker, 43 Folders,...
Read more →If you’re a geek like me (which you might be if you’re reading this), you’ve maybe heard the buzz about...
Read more →I have an obsession with reading. Well, actually, as it stands now, it’s more of an obsession with being able...
Read more →