I’m excited about a certain type of security product, or, at least the idea…
Archives for March 2008
Awesome New Infosec Class
The University of Washington’s School of Computing and Engineering is offering…
New Anti-Spam Tactics
So I’m trying out a new anti-spam combination: Re-captcha Akismet If you…
8 Powerful Features of Safari That Few People Know About
Safari is an excellent browser for many reasons; its speed, clean aesthetics and…
Three Powerful Safari Features That Few People Use
[Edit: An updated version of this post, with 6 additional features, can be found…
Rijndael is Pronounced “Rhine Dahl”
Well, technically [rɛindaːl], but “Rhine Dahl”, or even, “Rine…
Information Security as Insurance
The future of information security is to provide data to insurance companies.…
Security and Obscurity: Does Changing Your SSH Port Lower Your Risk?
My opinion on security and obscurity is that obscurity can in fact help improve…
The Craziest Thing You’ll Ever Learn About Pi
First off, happy pi day. According to a physicist at the Exploratorium in San…
Capturing Traffic Once and Making That Traffic Available to Multiple Tools
I’ve been obsessed with an idea for a while now of a networking and security…
A Logical Approach to the Council on Foreign Relations (CFR) and One World Government [NWO] Conspiracy
Let me just say that I am highly resistant to conspiracy theories in general.…
What “Net Neutrality” Is, and Why it Matters
Net Neutrality is one of the most important challenges facing civilization as…
Performing a “Cold-Boot” Proof of Concept Without Princeton’s Bit-Unlocker
Most in the information security community have heard of the “cold-boot” attack…
My Thoughts on Depression
A new BBC piece is highlighting an alternate approach to depression. Rather than…
Time to Switch From Debit to Credit When Paying for Things?
I tend to prefer debit when purchasing things. It hasn’t really been a security…