blog.avolio.com
fred avolio's musings: "What are you looking for in a job?"
http://blog.avolio.com/2010/05/what-are-you-looking-for-in-job.html
Musings on security and other topics. What are you looking for in a job? I was listening to the "43 Folders" podcast of Merlin Mann’s Time and Attention Talk at Rutgers. He was discussing the culture of meetings in different companies. As I listened I thought about a question someone had recently asked: what sorts of things are you looking for in a job? Caveats: We need to eat. We need to be able to care for our health and that of our families. Sometimes, for a season,. The most important thing. I concen...
blog.avolio.com
fred avolio's musings: October 2011
http://blog.avolio.com/2011_10_01_archive.html
Musings on security and other topics. Upgraded iPod Touch to iOS 5. Many have written about the new software for the iPod Touch, iPhone, and iPad, iOS 5. I am writing this short blog entry, just to report my experience. Downloading iTunes 10.5 and iOS 5 were quick and painless. The installation was not so quick and was, while painless, a bit disconcerting. When it finally got to the iPod update, iTunes claimed that the iPod Touch was over capacity. by 22 G. I like the new system with its changes. Other l...
blog.avolio.com
fred avolio's musings: March 2010
http://blog.avolio.com/2010_03_01_archive.html
Musings on security and other topics. Going back to my notes of things that I set aside to discuss or to comment on, I find a February 3 Computerworld article, Old security flaws still a major cause of breaches, says report. The article makes some recommendations, including knowing your network assets. In other words, knowing what is is on your network, and knowing if it is behaving as you expect, will enhance your security posture. I add the following:. If you are relying on reviewing log files, and ass...
blog.avolio.com
fred avolio's musings: A Facebook friend is in trouble. Or is she?
http://blog.avolio.com/2010/04/facebook-friend-is-in-trouble-or-is-she.html
Musings on security and other topics. A Facebook friend is in trouble. Or is. Earlier today, I " retweeted. Who pointed to this story: Woman's Facebook Account Hacked, Friends Ripped Off. The short version is after the account was broken into, the bad-guy sent a message to all of her friends currently on-line. "The message sent to her friends was a desperate plea for cash. . 'hey I'm in London I just got mugged, my phone, my credit card was stolen, please send money so I can get home.'". MD, United States.
blog.avolio.com
fred avolio's musings: Upgraded iPod Touch to iOS 5
http://blog.avolio.com/2011/10/upgraded-ipod-touch-to-ios-5.html
Musings on security and other topics. Upgraded iPod Touch to iOS 5. Many have written about the new software for the iPod Touch, iPhone, and iPad, iOS 5. I am writing this short blog entry, just to report my experience. Downloading iTunes 10.5 and iOS 5 were quick and painless. The installation was not so quick and was, while painless, a bit disconcerting. When it finally got to the iPod update, iTunes claimed that the iPod Touch was over capacity. by 22 G. I like the new system with its changes. Upgrade...
blog.avolio.com
fred avolio's musings: December 2009
http://blog.avolio.com/2009_12_01_archive.html
Musings on security and other topics. Back in 1979, just out of grad school, I got my first real job working as a software developer (we used to be called "programmers" in the olden days). I learned the C programming language then and did my software development on a Digital Equipment Corporation PDP-11/70 minicomputer. Running 6th edition UNIX. Code could crash the whole machine. "Why doesn't the operating system protect against such things? Be important for data integrity or program availability, not f...
blog.avolio.com
fred avolio's musings: February 2010
http://blog.avolio.com/2010_02_01_archive.html
Musings on security and other topics. Security Axioms, Good, Old Stuff. It has been years since I published a list of Security Axioms. On my web page. Note, I didn't write "My" security axioms. They are old, probably timeless, and too-often forgotten. Bill Murray, in his Thinking About Security. Blog mentions some that fit right in, in his post "Effective" Security. Posted by Fred Avolio. Phishing and Phacebook Applications. Oops meant "Facebook.". They feed on our greed and on our pride, right? Get atte...
blog.avolio.com
fred avolio's musings: Using Evernote Clearly to Capture Articles Into Evernote to Read Later
http://blog.avolio.com/2012/03/using-clearly-to-capture-articles-into.html
Musings on security and other topics. Using Evernote Clearly to Capture Articles Into Evernote to Read Later. In June, 2011 I mentioned in Using Readabiliy and Evernote to capture items from the web. How I capture articles from the web into Evernote for reading later. My goal is to be able to capture things I want to read later, in avery readable form and in a way that does not require an Internet connection. I use the Readability extension to Safari. I have started to use Google Chrome. MD, United States.
blog.avolio.com
fred avolio's musings: Information Assurance
http://blog.avolio.com/2007/02/information-assurance.html
Musings on security and other topics. I work in the information assurance area at Johns Hopkins University Applied Physics Lab. I am a senior IA professional. When did network and computer security become "information assurance," and why? I do understand that the idea of "information assurance" (IA) sounds broader than "computer and network security," but is it really? Why and when did this change? Bobby Miller wrote, "I've been in the field since 1978 - get used to terminology changes! MD, United States.