albion.com
Netiquette Home Page -- A Service of Albion.com
http://www.albion.com/netiquette
Netiquette is network etiquette, the do's and don'ts of online communication. Netiquette covers both common courtesy online and the informal rules of the road of cyberspace. This page provides links to both summary and detail information about Netiquette for your browsing pleasure. The Core Rules of Netiquette. Learn Netiquette basics by reading this concise overview of network etiquette excerpted from the book Netiquette. Complete Online Edition: Table of Contents. The Art of Flaming. Is a net classic t...
derricocomputers.com
derrico computers
http://www.derricocomputers.com/resources.htm
One stop shopping for all your recruiting needs . . . check out our links. Click above to see more than 100 job boards that will help you find candidates. Click on a link to get connected . . . Regional and national salaries for it professionals. Industry news for recruiters:. Keeping informed on the biz. It dictionaries and acronym finders:. Links to sites to decode the jargon. Links to help you track down those candidates. Email us your favorite link and we will add it!
albion.com
Rule 7 -- The Core Rules of Netiquette -- Excerpted from Netiquette by Virginia Shea -- Albion.com
http://www.albion.com/netiquette/rule7.html
Rule 7: Help keep flame wars under control. Flaming is what people do when they express a strongly held opinion without holding back any emotion. It's the kind of message that makes people respond, Oh come on, tell us how you really feel. Tact is not its objective. Does Netiquette forbid flaming? And Seth T. Ross.
albion.com
The World of UNIX Security Tools
http://www.albion.com/security/usst/intro-5.html
The World of UNIX Security Tools. The history of UNIX security is the stuff of lore. Since its humble beginnings as a Bell Laboratories project lead by Dennis Ritchie and Ken Thompson in the late 1960s, the UNIX operating system has been programmed and hacked by successive generations of systems programmers. In November 1988, Robert Tappan Morris released the infamous Internet worm that corrupted thousands of net-connected machines overnight. Note that many UNIX security tools are free both in the sense ...
albion.com
Albion.com
http://www.albion.com/security/joy/index.html
The Joy of Security. Rough draft, STR, 20061112. Security is a state of balance, harmony, and sufficiency. Think of sitting at home, in a protected space, enjoying life with loved ones, without fear. Security gives a warm feeling, and provides support for all the joys of life. The risks in the environment are sufficiently mitigated or removed. You are free to play and work, to live life to its fullest. Security should never be driven by fear, though fear-mongers often try to set the security agenda. ...
albion.com
UNIX: A Practical Definition
http://www.albion.com/security/usst/intro-1.html
UNIX: A Practical Definition. Some of the drift in the meaning of UNIX is due to legal quandaries; some of it is the result of various commercial UNIX wars that have been waged over the years; some of it results from battles of wit and mind, with superior but unorthodox technologies winning over inferior authorized ones. While there may be no such thing as UNIX, the term is a trademark owned by the Open Group, an international consortium that demands the mark receive proper attribution. I might add that ...
albion.com
Ten General Security Rules
http://www.albion.com/security/usst/intro-8.html
Ten General Security Rules. Before we roll up our sleeves and get into the devilish details of planning and implementing UNIX system security, I'd like to posit ten general rules or themes that I'll return to again and again in this book. Rule 1: Security Through Obscurity Doesn't Work. Rule 2: Full Disclosure of Bugs and Holes Benefits Security. Rule 3: System Security Degrades in Direct Proportion to Use. Rule 4: Do It Right Before Someone Does It Wrong For You. Rule 8: Good and Evil Blend into Gray.
albion.com
The Many Flavors of UNIX
http://www.albion.com/security/usst/intro-3.html
The Many Flavors of UNIX. UNIX Variants and Clones. Apple Computer, Inc. Http:/ www.rs6000.ibm.com/. Http:/ www.siemens.com/. Berkeley Software Design, Inc. Http:/ www.bsdi.com. Http:/ www.intergraph.com. Software in the Public Interest, Inc. Http:/ www.gnu.org/. Software in the Public Interest, Inc. Http:/ www.debian.org. Http:/ www.dg.com/. Http:/ www.unix.digital.com/. Sequent Computer Systems, Inc. Http:/ www.sequent.com/. Http:/ www.esix.com/. Http:/ www.freebsd.org. Http:/ www.gnu.org.
albion.com
Computer Security: A Practical Definition
http://www.albion.com/security/usst/intro-4.html
Computer Security: A Practical Definition. Defining computer security is not trivial. The difficulty lies in developing a definition that is broad enough to be valid regardless of the system being described, yet specific enough to describe what security really is. In a generic sense, security is freedom from risk or danger. In the context of computer science, security is the prevention of, or protection against,. Access to information by unauthorized recipients, and. A Taxonomy of Computer Security.