Musings - Geek speak elucidations

In whom do we trust?

11/21/2008 13:40
It’s one thing when private and personal information is breached through accident, theft, or the occasional cracker hacking the systems. While damaging, these occurrences can be defended against and the risk can be mitigated and managed through various means. That being said, it is quite another...

Hunting the Elusive Email...

11/06/2008 10:20
Litigation is an unpleasant fact of life for many businesses and it now has serious Information Systems implications. E-Discovery (Electronic Discovery) rules shine a very bright spotlight on your Information Systems policies and procedures, and how well they are implemented. The policies,...

Survival of the Adminless

09/30/2008 15:41
Just how dependent is your organization on your computer/network/systems administrator(s)? I like to think that all administrators are a Nietzschesque breed of super-humans who never get sick, hit by busses, retire, win the lottery, take other jobs, or quit. Unfortunately, statistics show...
<< 7 | 8 | 9 | 10 | 11 >>

Rants - Tech savvey explications

IE 0 Day Exploit

12/12/2008 19:27
Microsoft reported a new "zero-day exploit" that affects most versions of the Internet Explorer browser. A zero-day exploit is a security vulnerability that is being exploited before the software vendor or public know that the issue exists. This particular exploit attacks flaws within Internet...

Spoofed NDR issues

04/14/2008 13:05
We've seen a rash of NDR (non-Delivery Response) floods happening to our clients. In all cases, it appears that the spam being NDRed is spoofed, but we are receiving reports from these users that they are being black listed on spam filters. Is anyone else seeing this problem? Thanks, -J-

Welcome to the home of the Certifiable Technologist - Jason Appel

Welcome. This is an area dedicated to thoughts, comments, discussions, and musing on network/computer security, privacy, and technology... or anything else that looks interesting. The idea is to provide analysis, commentary and geekspeak translations of news, events, and happenings in the security and technology arenas.

You can read new posts on this blog via the RSS feed.



Keep in mind that this site is a work in progress

I am always interested in constructive critisism and suggestions, so feel free to comment.