Cyber threats in 2012: 5 pain points
- Mustaque Ahamad
- directory of Georgia Institute of Technology's Information Security Center
- bad guys will take everything an monetize it.
- personal device
- PIV (Personal Identity Verification) card
- social networking
- cloud
- IPv6
- Current Events
- search engine poisoning
3 resolutions you can make for better security in 2012
- Be careful what you do online
- Extend you cyber hygiene to personal devices
- Avoid the disgruntled employee
There Is No Such Thing as Android, Only Android-Compatible
- Open source software is not free; it is free to change.
Troubleshooting faulty network connectivity, part 1: A step-by-step guide
Troubleshooting faulty network connectivity, part 2: Essential network commands
- talks about nbtstat and netstat
No comments:
Post a Comment