Viewing posts tagged Miscellaneous
the-coming-browser-wars-and-why-they-will-be
Posted by: admin 16 years, 1 month ago
I have been reading about how IE7 will be more secure than previous versions. My thoughts: too little too late.the-open-source-security-debate
Posted by: admin 16 years, 1 month ago
There's been plenty of debate over whether open source software is more or less secure than proprietary software and it now seems to have mostly died down as people realize that "it depends" is the correct answer. OSS camp points to Apache and other packages and the proprietary camp points out the vast improvement in IIS.too-bad-he-is-not-dr-obrien
Posted by: admin 16 years, 1 month ago
From Neatorama:
Graham O’Brien thought he was just unlucky when he couldn’t access his bank account by phone. But it turned out that the call center staff thought he was a woman trying to defraud the bank because of his squeaky voice.You would think that they could tag his records with some indication that he's got a squeaky voice.
voting-hackable-or-error-prone-you-decide
Posted by: admin 16 years, 1 month ago
Hat Tip: MSNBC First Read: The SciFi channel has a page up that displays voting mechanism by state. It's quite jazzy, but I have one problem with the methodology. Mainly that they seem to think that if it's electronic, it's hackable but not error prone. While they do have a page discussing the pros and cons of the voting machines, they don't rank them that way on the map.
what-is-the-opposite-of-a-moral-hazzard
Posted by: admin 16 years, 1 month ago
According to a recent study by researchers from my alma mater, the University of Virginia, the use of cameras to fine motorists who run red lights actually increases the number of accidents at those intersections. There are fewer T-bone collisions, but more rear-end collisions.Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)