Y’know, maybe if they changed the Computer Fraud and Abuse Act to stop discouraging domestic “cyber security experts” from independent learning, more would be inclined to join the Federal government. Most “cyber security” colleges nowadays just regurgitate Information Assurance policies due to ei...
Putting the U.S. Cyber Command, the military’s cyberwar wing, in the same location and under the same commander, expanded the NSA’s power. The result is an agency that prioritizes intelligence gathering over security, and that’sincreasingly putting us all at risk. It’s time we thought...
Seriously, Bruce, for your part, I think it would be tremendously helpful if you would consider doing just a bit more to lend your voice as a cyber-security expert to encourage closing down the physical vulnerabilities that let these idiots wage their silly cyber-war games by promoting just ...
But today my gratitude journal shall have an entry about the delightful picture of skeptical poring obsessively through the internets to Shape, Deter, and Dominate actual and potential discourtesy adversaries.Clive Robinson • January 20, 2015 11:24 AM @ Dirk Praet, I don’t think Skeptical i...
…all the Regin victims in the region were joined together in a peer to peer VPN-like network and able to communicate with each other. Thus, attackers turned compromised organizations in one vast unified victim and were able to send commands and steal the information via a single entry point...
In a January 2009 entry, TheTrueHOOHA exhibited strong support for the U.S. security state apparatus and said leakers of classified information “should be shot in the balls”.”curious 77 • November 17, 2017 10:29 AM @hmm “If China as a NATION hadn’t just banned WINNIE THE ...
2) the intel is also found in social networks whose products like Twitter have a lower barrier to entry; i.e., you don’t have to build and maintain an avatar; rather a persona – easily done. WOW is hugely popular with women as well as men, but monitoring social networks; i.e.,...
Given that Sun claim it is impossible to fill a zetabyte filesystem without boiling the worlds oceans (seehttp://blogs.sun.com/dcb/entry/zfs_boils_the_ocean_consumes) I find it hard to believe the Yottabyte claim… J. Brad Hicks•October 22, 2009 7:31 AM ...
His Wikipedia entry also gives this as his most senior NSA grade. Possibly he was a Technical Director (i. e. one among many), not the Technical Director. It would be interesting to know if there is differing information.Grauhut • October 3, 2014 8:48 AM ‘The people are ...
Now ask yourself what is going on with regards to this IPC, ie what has access to it and at what level. In a system memory only system any kernel level process has access to the shared memory. In addition a file store IPC the Kernel and various low level drivers have access to the ...