blog.avolio.com
fred avolio's musings: "What are you looking for in a job?"
http://blog.avolio.com/2010/05/what-are-you-looking-for-in-job.html
Musings on security and other topics. What are you looking for in a job? I was listening to the "43 Folders" podcast of Merlin Mann’s Time and Attention Talk at Rutgers. He was discussing the culture of meetings in different companies. As I listened I thought about a question someone had recently asked: what sorts of things are you looking for in a job? Caveats: We need to eat. We need to be able to care for our health and that of our families. Sometimes, for a season,. The most important thing. I concen...
blog.avolio.com
fred avolio's musings: October 2011
http://blog.avolio.com/2011_10_01_archive.html
Musings on security and other topics. Upgraded iPod Touch to iOS 5. Many have written about the new software for the iPod Touch, iPhone, and iPad, iOS 5. I am writing this short blog entry, just to report my experience. Downloading iTunes 10.5 and iOS 5 were quick and painless. The installation was not so quick and was, while painless, a bit disconcerting. When it finally got to the iPod update, iTunes claimed that the iPod Touch was over capacity. by 22 G. I like the new system with its changes. Other l...
blog.avolio.com
fred avolio's musings: March 2010
http://blog.avolio.com/2010_03_01_archive.html
Musings on security and other topics. Going back to my notes of things that I set aside to discuss or to comment on, I find a February 3 Computerworld article, Old security flaws still a major cause of breaches, says report. The article makes some recommendations, including knowing your network assets. In other words, knowing what is is on your network, and knowing if it is behaving as you expect, will enhance your security posture. I add the following:. If you are relying on reviewing log files, and ass...
blog.avolio.com
fred avolio's musings: A Facebook friend is in trouble. Or is she?
http://blog.avolio.com/2010/04/facebook-friend-is-in-trouble-or-is-she.html
Musings on security and other topics. A Facebook friend is in trouble. Or is. Earlier today, I " retweeted. Who pointed to this story: Woman's Facebook Account Hacked, Friends Ripped Off. The short version is after the account was broken into, the bad-guy sent a message to all of her friends currently on-line. "The message sent to her friends was a desperate plea for cash. . 'hey I'm in London I just got mugged, my phone, my credit card was stolen, please send money so I can get home.'". MD, United States.
blog.avolio.com
fred avolio's musings: Upgraded iPod Touch to iOS 5
http://blog.avolio.com/2011/10/upgraded-ipod-touch-to-ios-5.html
Musings on security and other topics. Upgraded iPod Touch to iOS 5. Many have written about the new software for the iPod Touch, iPhone, and iPad, iOS 5. I am writing this short blog entry, just to report my experience. Downloading iTunes 10.5 and iOS 5 were quick and painless. The installation was not so quick and was, while painless, a bit disconcerting. When it finally got to the iPod update, iTunes claimed that the iPod Touch was over capacity. by 22 G. I like the new system with its changes. Upgrade...
krebsonsecurity.com
U.S. Government Takes Down Coreflood Botnet — Krebs on Security
http://krebsonsecurity.com/2011/04/u-s-government-takes-down-coreflood-botnet
Ensp;Subscribe to RSS. Ensp;Follow me on Twitter. Ensp;Join me on Facebook. In-depth security news and investigation. US Government Takes Down Coreflood Botnet. The US. Justice Department. Were granted unprecedented authority this week to seize control over a criminal botnet that enslaved millions of computers and to use that power to disable the malicious software on infected PCs. Sample network diagram of Coreflood, Source:FBI. By 2008, Coreflood had infected some 378,000 PCs, including computers at ho...
ccnso.icann.org
Cybercrime and Security Resources | Country Code Names Supporting Organisation
http://ccnso.icann.org/resources/cybercrime-resources.htm
Country Code Names Supporting Organisation. Cybercrime and Security Resources. Email Lists and Newsletters. Internet Government Control Acts. Policy and Legal Resources. Council Decisions and Resolutions. ICANN Bylaws, Article IX. CcNSO/Government Advisory Committee Liaison Working Group (GAC WG). Cross-Community Working Group on Use of Country/Territory Names as TLDs. Cross-Community Working Group to Develop an IANA Stewardship Transition Proposal on Naming Related Functions. Email Lists and Newsletters.
blog.avolio.com
fred avolio's musings: December 2009
http://blog.avolio.com/2009_12_01_archive.html
Musings on security and other topics. Back in 1979, just out of grad school, I got my first real job working as a software developer (we used to be called "programmers" in the olden days). I learned the C programming language then and did my software development on a Digital Equipment Corporation PDP-11/70 minicomputer. Running 6th edition UNIX. Code could crash the whole machine. "Why doesn't the operating system protect against such things? Be important for data integrity or program availability, not f...
SOCIAL ENGAGEMENT