Always wipe your devices/drives before selling them. The McCain campaign found this out the hardway.
Some people may never find out what they've released.
Monday, December 15, 2008
Implications of the Myspace Suicide case
Robert Graham raises some interesting points about the Myspace bullying/suicide case. He suggests that sometimes our personal views can cloud our judgment, leading to a bending of the law. Consider if he might be right. Accounts of jury reactions are noted elsewhere.
When reading about this case, try to think if the punishment achieves one of the four goals and consider the aftermath and what it might mean for you in the future.
When reading about this case, try to think if the punishment achieves one of the four goals and consider the aftermath and what it might mean for you in the future.
Doppleganger (again)
Related to a previous post on this subject, some might suggest that you're nobody unless someone is faking you
Sunday, December 14, 2008
Young people as a security threat?
Apparently the younger generation is seen as a threat:
Generation Y user behavior could endanger security of enteprise systems, studies say
Generation Y user behavior could endanger security of enteprise systems, studies say
Monday, December 8, 2008
Agent.btz visits the Pentagon
The Pentagon banned USB devices due to Agent.btz. While speculations run high, I particularly enjoyed this idea about how Agent.btz got on the network.
Labels:
security breach,
social engineering,
various notes
Friday, December 5, 2008
Your face is easy to fake
A Vietnamese security firm has demonstrated that facial recognition software can be spoofed. Enhanced pictures are used to bypass the software. Perhaps you should remove that Facebook photo now?
Perhaps we should move on to a more robust biometric system.
Perhaps we should move on to a more robust biometric system.
Wednesday, December 3, 2008
Linux vs Windows DOS commands
Here is a comparison between Windows DOS and Linux commands:
For more information on Linux commands check out this tutorial or this tutorial (scroll past the ssh stuff).
Windows DOS | Linux/Cygwin |
---|---|
dir | ls |
cd | pwd |
cd [path] | (same) |
cls | clear |
copy [old] [new] | cp [new] [old] |
del [file] | rm [file] |
move [old] [new] | mv [old] [new] |
tree | tree (Linux only) ls -R |
mkdir [dir] | (same) |
rmdir [dir] | (same) |
help [cmd] | man [cmd] |
type [file] | cat [file] |
date /t | (same without /t) |
time /t | date |
netstat -an | (same Linux only) |
netstat -rn | (same Linux only) |
ipconfig /all | ifconfig -a (Linux only) |
For more information on Linux commands check out this tutorial or this tutorial (scroll past the ssh stuff).
Subscribe to:
Posts (Atom)