Cyber threats in 2012: 5 pain points
  - Mustaque Ahamad
- directory of Georgia Institute of Technology's Information Security Center
- bad guys will take everything an monetize it.
- personal device
 -  PIV (Personal Identity Verification) card
- social networking
- cloud
- IPv6
- Current Events
- search engine poisoning
  3 resolutions you can make for better security in 2012
  - Be careful what you do online
- Extend you cyber hygiene to personal devices
- Avoid the disgruntled employee
  There Is No Such Thing as Android, Only Android-Compatible
  - Open source software is not free; it is free to change.
 Troubleshooting faulty network connectivity, part 1: A step-by-step guide
 
 Troubleshooting faulty network connectivity, part 2: Essential network commands
 - talks about nbtstat and netstat
 
 
 
No comments:
Post a Comment