A Proposed Project to Summarize the Concepts Taught by the Classics
So I have an idea for a project. The idea is to document the core concepts taught in the major...
Read more →So I have an idea for a project. The idea is to document the core concepts taught in the major...
Read more →Identity security company CyberArk has released a first-of-its-kind machine identity security solution, the Secure Workload Access Solution. The company says...
Read more →So I finally accomplished something with the site I’ve been wanting to do for a couple of months now–my “Discovered...
Read more →The Hong Kong Monetary Authority (HKMA) will announce on Monday new measures to be implemented by banks to safeguard the...
Read more →I think my argument for feel vs. features has been thoroughly supported over the last few years of iPhone success....
Read more →Laura Chappell just posted a great tutorial on getting GeoIP working with the new version of Wireshark (1.2). I set...
Read more →What follows is a primer on the key security-oriented characteristics of the HTTP protocol. It’s a collection of a number...
Read more →As of the last year or so my preferred method for installing and updating nmap is to use subversion. It’s...
Read more →Initiatives like the Top Talent Pass Scheme (TTPS) by the Hong Kong Government is making it easier for international talent...
Read more →The highest form of human awareness comes through a number of realizations and stages of acceptance regarding the nature of...
Read more →In a scenario where your SMB or enterprise gets constantly bombarded (portscans, brute force, spam, etc.) by Russia, China, Brazil,...
Read more →In the short time that Chrome has been around, it’s already about to overtake Internet Explorer on this website. The...
Read more →