Last Build Date: Mon, 01 Sep 2014 07:25:11 +0000
Wed, 03 Oct 2007 13:03:29 +0000Darren, at ProBlogger is celebrating the birthday of the blog with lots of competitions to win prizes. You have the details with all the prizes at Problogger Birthday Bash competitions, so if you want to win one visit the site frequently as there will be diferent competitons until next Monday.
Wed, 27 Jun 2007 06:52:23 +0000Yesterday we starting discussing the insider threat. Yes, those wily individuals who smile in our faces while engaging in some type of behavior that we&d find shocking, incredible, unconscionable, unforgivable – okay, you get my point. Interestingly enough, in the book, Insider Threat, the authors outline 4 types of insiders: pure insider, insider associate, insider … Continue reading Pure as the driven snow? Not!
Tue, 26 Jun 2007 06:58:43 +0000When I first started my career in information technology, I was rather shocked to find out that one of the likeliest threats to an organization wasn't external, but internal. Yes, that a trusted employee could in fact be the one carrying out some of the attacks that we mentioned previously. Just imagine Fred (not you, … Continue reading Insider Threats
Sat, 23 Jun 2007 04:30:37 +0000Welcome back! Well, since we&re on the topic of networks, it's important to note that these networks are getting more and more complex. And this complexity affects our lives in many ways. Today, we have all kinds of appliances and devices that are connected to networks. Our cell phones allow us to do a lot … Continue reading Networks Revisited
Wed, 20 Jun 2007 01:19:42 +0000Last week we learned a little about TCP/IP. This week we&ll take a closer look at how all of our computers, and other devices, talk to each other. In other words, how they communicate via networks. One of my fav movies of all times is Terminator 3 – Rise of the Machines. Okay, so even … Continue reading Computer-speak
Sat, 16 Jun 2007 03:39:26 +0000Yesterday, we focused our attention on the rules of the road for the information superhighway. Today, let's focus on who might be trying to hitch a ride along the way. Now, drive along any highway and you're likely to see at least one hitchhiker. While you might be tempted to lend a helping hand, I&ll … Continue reading What…hitchhikers along the information superhighway?
Thu, 14 Jun 2007 04:44:54 +0000Yesterday we briefly outlined TCP/IP. Today, let's delve a little deeper into its meaning. As we learned, TCP/IP is the language that facilitates communication between computers. TCP/IP is a set of protocols that connect computers on the Internet. By protocols, I'm referring to a collection of policies, procedures and practices. In other words, when referring … Continue reading TCP/IP Revisited
Tue, 12 Jun 2007 22:59:07 +0000Over the past few weeks, we&ve taken a high-level overview of some of the important concepts in computer security. And while we needed to establish a foundation, now it's time to get our hands a little dirty to see what computer security is all about. This week, we&ll spend some time on our own computers. … Continue reading IP, TCP/IP, oh my!
Fri, 08 Jun 2007 05:51:05 +0000By now, you're probably like, worm, viruses and now bugs, oh my! While we&re aware of the problems that worms and viruses can cause for us humans, this week, we&ve glimpsed at some of the problems that they can cause for our computers. In continuing with our study of (hu)man&s sometimes destructive nature, right now … Continue reading Oh buggers!
Wed, 06 Jun 2007 10:43:00 +0000I&ve been meaning to write a post about personal firewalls, such as the one built into Windows, and why it's important to use them, but I came across an issue this weekend that strikes me as a more important use of firewalls that not everyone may be aware of. If you're like most internet users, … Continue reading Good Security Starts at the Perimeter