Subscribe: Managing Intellectual Property & IT Security
Preview: Managing Intellectual Property & IT Security

Hacking Cloud Computing

Cloud Computing has fundamentally changed how we view utility computing, add a little Google hacking and other hacking methods and we end up some very interesting things going out on there in terms of what people are sharing. This blog is about the cloud,

Published: Fri, 20 Apr 2018 14:05:14 +0000


In the fall out of Prism some things have really changed

Fri, 18 Oct 2013 11:18:04 GMT

In the fall out of the NSA Government spying row a number of things have become readily apparent from both the business security viewpoint and the personal security viewpoint.

Adobe and SAP head towards the cloud

Wed, 08 May 2013 08:42:27 GMT

Not unexpected but with the idea of the subscription model to even out income at Adobe, and the success of other cloud ERP providers SAP had to do this, expect more large companies to watch this roll out and see what happens.

Does the Internet really need a Delete Tool?

Tue, 07 May 2013 11:40:21 GMT

Every once in a while someone comes along with an idea that makes sense, but given the value of the data we put out there for governments, employers, and marketing folks, I don?t think a delete tool for the internet is going to happen.

Announcing the Amazon Web Services Certification Program

Wed, 01 May 2013 10:28:06 GMT

Actually this is important, and probably about time, but with all the people flocking into Cloud Computing, Amazon does one thing it should do, offer a certificate program.

Cross Domain XML Files

Tue, 30 Apr 2013 10:00:01 GMT

They are still out there, and still interesting to find.

A walkthrough of the Windows Azure Interface

Mon, 29 Apr 2013 17:35:25 GMT

Windows Azure promises a lot of interesting things, this walk through of the interface might just help you understand a little bit more about what services Windows Azure provides.

When things go wrong with Windows Azure

Mon, 29 Apr 2013 17:13:21 GMT

I recently started with Windows Azure, and really tried to start digging into it today. Unfortunately, everything went wrong.

Facebook Home as a relationship status: It's Complicated

Fri, 05 Apr 2013 14:28:23 GMT

Facebook unveiled the new Facebook Home overlay for your android phone, and as far as things go as a shiny happy press corps it all looks magical

Basic control structures in programming

Fri, 05 Apr 2013 10:00:05 GMT

If we all knew how to use an If Then Else statement the world would be a better place.

Understanding the Security Organization

Thu, 04 Apr 2013 14:35:49 GMT

Not every security department or IT department is made the same, it is important to know the differences in working with various security departments and how they view risk.

Using Grep and Regular Expressions

Thu, 04 Apr 2013 14:28:12 GMT

I hate to say it but I am a data junkie, so it is a lot of fun to be able to go through a directory of http logs looking for just error code 500 using grep and recursion.

Hacking Gaming Platforms EA Origin

Wed, 20 Mar 2013 10:00:02 GMT

If you are not watching Black Hat you are missing some interesting stuff.

Crooks break into Casino CCTV systems to nab 33 Million

Tue, 19 Mar 2013 10:00:01 GMT

You almost have to wonder if they did this over the internet. While the story is still sketchy in terms of details, it seems that a high roller international gambler used the Crown Casino?s internal CCTV monitoring system against it to net some 33 million dollars down in Australia.

Facebook needs to learn to manage scruffy neighborhoods to stay relevant

Mon, 18 Mar 2013 11:28:24 GMT

Not all of us live in or want to live in a PG-13 world. But the recent rash of shutdowns over perfectly normal behavior has me wondering how Facebook?s going to set a global standard for what the social media neighborhood looks like.

Will Obama's Cyber Warfare Policy Backfire?

Wed, 13 Mar 2013 10:00:03 GMT

Jason Healey director of the Cyber Statecraft Initiative at the Atlantic Council brings up an interesting thought about how diplomacy is shaping how we view cyber warfare.