-
Recent Posts
Categories
Archives
- July 2023
- April 2023
- March 2023
- February 2023
- January 2023
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- April 2020
- February 2020
- January 2020
- December 2019
- November 2019
- October 2019
- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- December 2018
- November 2018
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
Meta
Tags
- arduino
- aws
- best practices
- boot
- booting from grub
- c / c+
- cloud computing
- DIY
- docker
- dos
- encryption
- FOP
- grub
- hardware
- howto
- humor
- java
- linux
- load testing
- medicine
- oldschool
- online shopping
- open source
- paranoid
- pcbuilding
- performance testing
- political activism
- politicians
- programming
- review
- scripting
- security
- soapbox
- strangelaws
- surveillance
- tinfoil hat
- UK
- vaccine
- virtual computing
- virus
- web services
- websphere
- windows
- wordpress
- XSL-FO
Category Archives: security
Cloud technology – the dark side
There are a lot of good things about using cloud technology. If the cloud is powering your company you might be using the advantage of scaling the resources only when you need them. Nothing could be better than starting up … Continue reading
Posted in security
Comments Off on Cloud technology – the dark side
Year of the Linux Desktop – 2026
It seems like only yesterday (2003) that a large government entity, the city of Munich, announced it would be converting their cities personal computers over to their own edition of Linux called LiMux. The good news was that perhaps 80% … Continue reading
Hacking skills as determined by a politician
Words have meaning and it is a bit disturbing when you read an article or see a speech where they are being incorrectly used. The most recent example of this is how people use or refer to technology. When computers … Continue reading
Posted in programming, security
Tagged best practices
Comments Off on Hacking skills as determined by a politician
More privacy or just annoying control
There are a lot of things you should be doing. Eat right, exercise and get enough sleep. These are some of the important things we should be doing as humans but there is quite a few things we should be … Continue reading
Posted in security
Comments Off on More privacy or just annoying control
Think of the children
I actually was a child once and have children of my own so I can understand wanting to protect some of society’s most vulnerable people. A topic such as child porn is probably the worst possible thing that could occur. … Continue reading
Do smart phones create insecurity
The title is actually a bit harsh. Smart phones just like any other IT tool or can be used securely or insecurely. I don’t usually think about this until recently. A colleague told me of how he had a death … Continue reading
Posted in security
Comments Off on Do smart phones create insecurity
Physical security = security
Papa, I cannot log into this old computer. I don’t have the administrator password. I work in IT so I actually know better. It all started when my son came home with an old computer monitor from school on the … Continue reading
Posted in security
Comments Off on Physical security = security
Deep fake in an environment of fake news
I remember reading an internet joke which was a job placement. It was looking for someone who would be willing to work for 40 hours a week, clean up messy spills and deal with diapers and up to 128 hours … Continue reading
More like postcards than like letters
Every couple of years, sometimes more often, some politician or law enforcement officer brings up that encryption is preventing them from doing their job. Just recently reported in Arstechnica was such an article about the US Attorney General William Barr. … Continue reading
Man in the middle, then and now
When the internet started, a long long time ago, things were a bit more trusting. This isn’t all that surprising as the internet actually started as ARPANET which was a research network created with funding from the US department of … Continue reading
Posted in security
Comments Off on Man in the middle, then and now