j-j.co.za
Ebooks and readers in South Africa Frequently Asked Questions | j-j.co.za
http://j-j.co.za/ebooks-faq
Sharing thoughts and ideas on business, security and photography. Pigspotkzn useage and code of conduct. Posted on July 7, 2011. Kindle, eReader and eBooks in South Africa – Frequently Asked Questions. Many visitors to this site arrive through search queries. People looking for information about which Kindle to buy, where to get it in SA, features that work (or don’t) and similar.]. The questions and answers. Buying and using eBooks. Where is the best place to get eBooks? More info here :. There are ways...
j-j.co.za
#itwebsec | j-j.co.za
http://j-j.co.za/tag/itwebsec
Sharing thoughts and ideas on business, security and photography. Pigspotkzn useage and code of conduct. Timeline of my tweets for #itwebsec IT Web Security Summit 2014. Posted on June 03, 2014. I came across tweetbook.in. Below is the tweetbook. And the PDF’d twitter page, scroll down until you find the relevant tweets, sorry no selection options – and it is in reverse chronological order. Oops – the file was 72 meg so exceeds the filesize limit for inserting. Pity indeed). Which lets you create (and ev...
j-j.co.za
Twittering pigspotters & traffic updates:accounts to follow | j-j.co.za
http://j-j.co.za/twittering-pigspotters-and-traffic-updates
Skip to primary content. Pigspotkzn useage and code of conduct. Sharing thoughts and ideas on business, security and photography. About twittering pigspotters and traffic updates – twitter traffic accounts you should follow. There are quite a number of different twitter accounts which can help you keep up to speed with what is happening on the roads around the country. Following a collection of these accounts really can make your life a whole lot more comfortable and relieve a lot of frustrations. 8211; ...
j-j.co.za
Events | j-j.co.za
http://j-j.co.za/category/events
Sharing thoughts and ideas on business, security and photography. Pigspotkzn useage and code of conduct. Facilitated CISA Study Session 28/4/2015 : Chapter 4 Part 1 to be broadcast via Google Hangouts. Posted on April 28, 2015. The sessions from the last few weeks have been reasonably successfully broadcast and recorded on Google Hangouts On Air so we will try to do the same for this afternoon’s session. If there is something we can improve ahead of the next session please let us know. The sessions from ...
j-j.co.za
Data Analytics | j-j.co.za
http://j-j.co.za/category/data-analytics
Sharing thoughts and ideas on business, security and photography. Pigspotkzn useage and code of conduct. Checking a sample of South African ID Numbers in Excel. Posted on March 11, 2015. Find a copy of this useful spreadsheet here : ID Number checker. Cross posted on ITSec’s blog. Written by Justin Data Analytics. Analysing SCCM Logs with Log Parser Studio. Posted on June 21, 2014. The IIS logs contain a number of useful fields (a sample included below) :. Time : 36526.7730902778. Cs(User-Agent) : SMS CCM.
j-j.co.za
(South) Africa's Top Twits | j-j.co.za
http://j-j.co.za/toptwits
Sharing thoughts and ideas on business, security and photography. Pigspotkzn useage and code of conduct. South) Africa’s Top Twits. Posted on July 7, 2011. I have now included some comparatives into the PDF and spreadsheet so you can see where a Twitter user ranked previously, how many followers they had back then, and the growth in absolute numbers and as a percentage. South) Africa’s Top Twits 12 May 2012. South) Africa’s Top Twits 12 May 2012. The cutoff on the last run (19 August) was 21 295 to make ...
j-j.co.za
Ethics | j-j.co.za
http://j-j.co.za/tag/ethics
Sharing thoughts and ideas on business, security and photography. Pigspotkzn useage and code of conduct. Guest lecture to UKZN 2014 MBA Class : Security & Ethics. Posted on August 24, 2014. What stands out for me in this set of discussions were three key diversions. 1 Bank fraud, and the divergence in opinions between the bank representatives and victims (customers). 2 Online identities (and password management). 3 Return to old school. Information Security and Ethics 2014 August 2014. On Thursday the 8t...
j-j.co.za
Security | j-j.co.za
http://j-j.co.za/category/security
Sharing thoughts and ideas on business, security and photography. Pigspotkzn useage and code of conduct. Working with SQL Server error logs in Log Parser Studio. Posted on April 05, 2015. With a little bit of effort I managed to figure out what was required, it turned out to be fairly simple. The trick was using the TSV format and then customising the settings. Read the rest of this entry ». Written by Justin Security. CISA, CGEIT, CRISC. What is a good score in an ISACA exam? Posted on March 11, 2015.
j-j.co.za
Security | j-j.co.za
http://j-j.co.za/tag/security
Sharing thoughts and ideas on business, security and photography. Pigspotkzn useage and code of conduct. Visualisation of time based attacks on DMZ (videos). Posted on August 24, 2014. Visualisation of two weeks of IPS data. Critical and high significant IPS events detected on a public facing Palto Alto device, visualised using Microsoft Excel Power Map for a period in November and December 2013. The attacks are differentiated between Spyware and Vulnerability. Visualisation of 24 hours of IPS data.
j-j.co.za
Ukzn | j-j.co.za
http://j-j.co.za/tag/ukzn
Sharing thoughts and ideas on business, security and photography. Pigspotkzn useage and code of conduct. UKZN MBA presentation 8th August 2013 : Information Security & Ethics. Posted on August 11, 2013. Below is the link to the slides. Please feel free to contact me if you have an questions or would like to discuss the subject further. Security and ethics UKZN MBA August 2013. Written by Justin Durban. UKZN MBA 2013 Presentation : Security & Ethics. Posted on March 02, 2013. Written by Justin Durban.