Viewing posts from January, 2009
voting-round-up
Posted by: admin 16 years, 3 months ago
- Remember to vote today, or there is no way your vote can be mis-counted
- It's expensive and screwed up notes Adam
- Unattended voting machines turning up, just waiting for manipulation
- If you're a Govenor or a member of Congress chances are that you won't be able to vote.
- I bet that pansy Ed Felton never thought of just busting the crap out of Diebold machine with a metal cat paperweight. NB: I am assuming that the guy didn't own the pansy-esque paperweight, but just borrowed it from his roomate/grandmother.
- If you're frustrated with both parties, just vote for Somebody Else, at least it will test the write-in functionality of your voting machine.
- No matter how many issues there are with voting macines, nothing will happen because the macine makers have come up with the ultimate distraction and surely the top news story: Brittany Spears files for divorce.. It's Diebold-olical!
i-for-one-welcome-our-ceylon-overlords
Posted by: admin 16 years, 3 months ago
From the Register:
A US defence department advisory board has warned of the danger that American war robots scheduled for delivery within a decade might be riddled with malicious code. The kill machines will use software largely written overseas, and it is feared that sinister forces might meddle with it in production, thus gaining control of the future mechanoid military.
i-can-dig-it-he-can-dig-it-she-can-dig-it-we-can
Posted by: admin 16 years, 3 months ago
With apologies to Friends of Distinction: An article I wrote for Howtoforge has made the front page of Digg. So can you digg it. baby?
spy-coins-from-canada-collect-all-6
Posted by: admin 16 years, 3 months ago
From Yahoo::
In a U.S. government warning high on the creepiness scale, the Defense Department cautioned its American contractors over what it described as a new espionage threat: Canadian coins with tiny radio frequency transmitters hidden inside.It is very strange. The article points out what a poor mechanism it is for tracking: short distance only, likely to be used to buy something, etc. I would think they must have been looking for a very limited amount of information. The location of a safe house, for example. While the distance is limited, you could compensate for that with an 'rfid rifle'.
risk-and-effectiveness-for-project-evaluation
Posted by: admin 16 years, 3 months ago
Gunnar Peterson has a post from Metricon about Bryan Ware's presentation about combining the effectiveness of a solution and the risk involved. I couldn't find the link to the actualy presentation. (I didn't have the time to go through them all.)
I think I would tie the effectiveness of the proposed security solution to the cost of capital of the overall project. It would be interesting to tie Bryan's work with my "work" on estimating the cost of capital for an information security project.
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)