I bought a new radio for my venerable 2002 Honda Civic this weekend. I want to be able to listen to security podcasts on my commute, which wasn’t practical with my factory radio. So, off to the nearest car audio shop (Custom Sounds) I went. I looked at a couple of $119 decks, then the [...]
An anonymous Microsoft developer spilled some juicy opinions about why Windows kernel performance isn’t all it could be. Although he has recanted much of what he said, some of his insights make a ton of sense.
I’ve been working on a Presario SR2011WM. It’s a basic, low-end, single-core Celeron D system from 2006 or so. It can take up to 2 GB of RAM, runs Windows XP adequately, and has SATA ports, so you can put an SSD in it if you want. But don’t be fooled by the name–the Celeron [...]
A wonderful NSA document called Untangling the Web, thanks to a FOIA request, is now available and free for all to download and use. Although dated, the book will prove highly useful. If you company or client is exposing data that it shouldn’t to the public Internet, this book will help you find it, so [...]
PC Magazine is advocating a bring your own laptop, with your own software approach to business. It likens it to mechanics who bring their own tools. The trouble is that while mechanical tools in a toolbox operate autonomously and don’t interfere with one another, software residing on a computer does.
So last week, I wrote about the difficulty of landing a security job and promised to explore it further. And I think the first key, and what should be the most crucial key, is being conversant in security. Having a certification is one thing, but at the end of the day, the biggest thing it [...]
Here’s a jewel from earlier this month from PC World: 12 easy, crucial PC tasks you should be doing and aren’t. They’re mostly related to performance and security. No wonder I like the article. A couple of the items won’t give the kinds of gains they used to–in this era when everyone thinks they need [...]
Livingsocial got breached. You need to change your password, if you have a Livingsocial account. There are two questions worth asking: How do you protect yourself, and how does this happen?
I was catching up on security podcasts this week, and a brief statement in one of them really grabbed me. The panel was talking about people who steal online gaming accounts, I think. The exact content isn’t terribly important–what’s very important is what this person found in the forums where the people who perform this [...]